Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Digital Security

What you may be getting wrong about cybersecurity

What you may be getting wrong about cybersecurity

Digital Security

What you may be getting wrong about cybersecurity

Attention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead

Lysa Myers29 Oct 20193 min. read


Privacy

Education and privacy legislation at ChannelCon

Education and privacy legislation at ChannelCon

Privacy

Education and privacy legislation at ChannelCon

As education is becoming an increasingly vital tool in companies’ security toolboxes, the question arises: How can they effectively implement security awareness training?

Lysa Myers21 Aug 20194 min. read


Privacy

Stopping stalkerware: What needs to change?

Stopping stalkerware: What needs to change?

Privacy

Stopping stalkerware: What needs to change?

What technology makers and others can – and should – do to counter the kind of surveillance that starts at home

Lysa Myers25 Jun 20197 min. read


Digital Security

Privacy legislation may soon affect smaller businesses

Privacy legislation may soon affect smaller businesses

Digital Security

Privacy legislation may soon affect smaller businesses

Why smaller businesses cannot afford to ignore how they gather, store and protect data

Lysa Myers21 Jun 20193 min. read


Digital Security

NIST cybersecurity resources for smaller businesses

NIST cybersecurity resources for smaller businesses

Digital Security

NIST cybersecurity resources for smaller businesses

How can smaller businesses address their cybersecurity risks without the resources of large organizations?

Lysa Myers04 Apr 20194 min. read


Digital Security

International Women’s Day 2019: How can we be better allies?

International Women’s Day 2019: How can we be better allies?

Digital Security

International Women’s Day 2019: How can we be better allies?

Every year on March 8, we celebrate International Women's Day to honor the social, economic, cultural and political achievements of women. But we also acknowledge that there is still a long way to go before we’ve truly reached gender parity. This day gives us the opportunity to reflect on how we can achieve that balance. So it’s particularly fitting that the theme of this year’s International Women’s Day is “Balance for Better”

Lysa Myers08 Mar 20193 min. read


How To

Email security does not end with your password

Email security does not end with your password

How To

Email security does not end with your password

A strong password is a great start, but there are more ways to make sure that your email is as secure as possible

Lysa Myers22 Jan 20196 min. read


Digital Security

Target targeted: Five years on from a breach that shook the cybersecurity industry

Target targeted: Five years on from a breach that shook the cybersecurity industry

Digital Security

Target targeted: Five years on from a breach that shook the cybersecurity industry

In December 2013 news broke that Target suffered a breach that forced consumers and the cybersecurity community to question the security practices of retailers

Lysa Myers18 Dec 20186 min. read


How To

How to protect yourself as the threat of scam apps grows

How to protect yourself as the threat of scam apps grows

How To

How to protect yourself as the threat of scam apps grows

As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?

Lysa Myers14 Dec 20186 min. read