Lysa Myers

Security Researcher

Opinions expressed by ICN authors are their own.

Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all this change can be difficult for even the most tech-savvy users, she enjoys explaining security issues in an approachable manner for companies and consumers alike. Over the years, Myers has worked both within antivirus research labs, finding and analyzing new malware, and within the third-party testing industry to evaluate the effectiveness of security products. As a security researcher for ESET, she focuses on providing practical analysis and advice of security trends and events.

The opinions expressed in this blog are those of Lysa Myers and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Stop training your employees to fall for phishing attacks

Improving security with diversity beyond the checkbox

Improving security with diversity beyond the checkbox

Security and diversity mean being compliant and fair, but also mean you need to get the widest possible range of perspectives.

Security experts must enable safer usage, not just limit unsafe behavior

Security experts must enable safer usage, not just limit unsafe behavior

Keeping the enterprise secure, even when users need to do things that are considered risky behavior.

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

Security lessons taught by goats

Security lessons taught by goats

Trying to contain farm animals who are surprisingly creative and adept at getting around barriers has a lot to teach us about how to approach our efforts at protecting data from crafty users.

Using empathy to improve technology

Using empathy to improve technology

Technical ability is only a starting point in developing useful, secure and powerful technology. If we take steps to better understand and represent a wider user base, we can get significantly improved financial results.

Why go to women-focused technology events?

Why go to women-focused technology events?

Why would a woman who's perfectly comfortable in groups predominantly populated by men want to step out of her comfort zone to attend women-focused technology groups?

Three shoddy security tropes it's time to retire

Three shoddy security tropes it's time to retire

It's not unusual for our collective cultural or technological understanding to discredit certain tropes over time. Tired cliches about shoddy security practices have been especially slow to be moved to the ash heap of history. Here...

What is key to improving the ratio of women in cybersecurity?

What is key to improving the ratio of women in cybersecurity?

The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline?

Don't succumb to security fatalism

Don't succumb to security fatalism

Protecting ourselves online can be incredibly complicated for anyone who isn't an expert, which has led to the current dismal state of security. Now the time for big changes to make things simpler.

Ways to improve security education in the New Year

Ways to improve security education in the New Year

As 2016 comes to a close, there are a few types of security advice we should strive to avoid. With all the inevitable confusion about effective ways of protecting our data and machines, security experts need to make sure the...

Supporting inclusivity in the office

Supporting inclusivity in the office

Many organizations are trying to change the limited demographic of people working in technology, but some are finding the process difficult. Here are a few tips for improving your efforts to hire and retain a wider variety of people.

Load More