Can pseudonyms be friendly and authentic?

Can pseudonyms be friendly and authentic?

Facebook has made some significant changes to their username policies to allow people more flexibility in choosing their "authentic name". But there are still plenty of people who are running afoul of the amended rules who use...

Ensuring data security with a bucket of worms and a hammer; goggles optional

Ensuring data security with a bucket of worms and a hammer; goggles optional

Getting in the habit of destroying sensitive data in junk mail and on old drives and devices isn't just about proper use of approved technology. Sometimes what you need is creativity, a sense of humor, and a good fire extinguisher.

For women to avoid 'office housework', work from home

It can be easy to see how parents, particularly working mothers, might realize benefits of working from home. But there are other, less obvious reasons that women in tech can reap big rewards by choosing to telecommute.

After the Anthem breach: How we can help secure health data

After the Anthem breach: How we can help secure health data

The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what’s going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such...

When good security advice...isn't

When good security advice...isn't

Is there any piece of common security advice that you find you disagree with? Context can often change what we should be telling people about how to secure their data and machines

Going beyond gender for the agenda

We've all seen tech conference with only male speakers on the agenda. What would it be like to have a conference agenda populated only with women, but not a "women in tech" event? And what can this show us about increasing diversity...

Five security developments we can be thankful for in 2014

The end of the year usually brings with it the annual tradition of consulting the InfoSec "crystal ball" to create a list of prognostications of doom for the coming year. Let's start a new tradition of looking back at the things that...

The Paradox of STEM Training

Recent statistics seem to point to an overabundance of STEM graduates, and yet there is negative unemployment in some tech careers. Why the discrepancy between supply and demand?

Myths and truths about employing women in Infosec

Myths and truths about employing women in Infosec

Lisa Myers breaks down the truths and the fallacies behind women in security careers.

Welcome to the Digital Mystique

Coming up with the title for a blog is always a tricky process. How do you best explain the direction and purpose in just a couple of words? I chose the name “Digital Mystique” for a number of reasons, which will give you a glimpse...

Load More