

Lysa Myers
Contributor
Lysa Myers began her tenure in malware research labs in the weeks before the Melissa virus outbreak in 1999. She has watched both the malware landscape and the security technologies used to prevent threats from growing and changing dramatically. Because keeping up with all this change can be difficult for even the most tech-savvy users, she enjoys explaining security issues in an approachable manner for companies and consumers alike. Over the years, Myers has worked both within antivirus research labs, finding and analyzing new malware, and within the third-party testing industry to evaluate the effectiveness of security products. As a security researcher for ESET, she focuses on providing practical analysis and advice of security trends and events.
The opinions expressed in this blog are those of Lysa Myers and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Of mice and malware
Some of the most important training I got for a career in computer security research was not from a computer-related class, but in a biology class. While these two disciplines may seem entirely unrelated, the skills that are needed in...

Have we doubled the number of women in infosec?
According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.

Has the word ‘breach’ has outlived its usefulness?
When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

Stop training your employees to fall for phishing attacks
Training your employees how to recognize and avoid phishing only works if trusted emails don’t look the same as criminals'.

Improving security with diversity beyond the checkbox
Security and diversity mean being compliant and fair, but also mean you need to get the widest possible range of perspectives.

Security experts must enable safer usage, not just limit unsafe behavior
Keeping the enterprise secure, even when users need to do things that are considered risky behavior.
Security lessons taught by goats
Trying to contain farm animals who are surprisingly creative and adept at getting around barriers has a lot to teach us about how to approach our efforts at protecting data from crafty users.

Using empathy to improve technology
Technical ability is only a starting point in developing useful, secure and powerful technology. If we take steps to better understand and represent a wider user base, we can get significantly improved financial results.

Why go to women-focused technology events?
Why would a woman who's perfectly comfortable in groups predominantly populated by men want to step out of her comfort zone to attend women-focused technology groups?

Three shoddy security tropes it's time to retire
It's not unusual for our collective cultural or technological understanding to discredit certain tropes over time. Tired cliches about shoddy security practices have been especially slow to be moved to the ash heap of history. Here...

What is key to improving the ratio of women in cybersecurity?
The biennial (ISC)2 report shows that the percentage of women in cybersecurity remains unchanged. Given the significant shortfall of security talent, what can we learn from this report about how to fix our weak and leaky pipeline?