Lysa Myers

Lysa Myers

Security Researcher


Education? 20 years helping – helping users, analyzing malware, talking with people implementing security technology, and testing security software.

Highlights of your career? Seeing the first few droplets before the Melissa virus storm hit, surviving the Worm Wars of 2004, my first presentation at VB in 2006, and having an article published in USA Today in 2013.

Position and history at ESET? Joined ESET: 2013. Current title: Security Researcher

What malware do you hate the most? The ExploreZip family – it overwrote files, thus destroying the data. Plenty of people lost a lot of work as a result of those outbreaks.

Favorite activities? Adventuring and whimsy-seeking.

What is your golden rule for cyberspace? An ounce of prevention is worth a pound of cure.

When did you get your first computer and what kind was it? 1981 Commodore VIC-20. And then I continued using a variety of early-80s technology until roughly 1993 (oof!).

Favorite computer game/activity? Checking my Twitter feed.


85 articles by Lysa Myers

Less Technical

What is Cyber Insurance?

What is Cyber Insurance?

Less Technical

What is Cyber Insurance?

What is cyber insurance, and is it worth considering to protect your business?

Lysa Myers05 Jun 20155 min. read


How goes the switch to Chip & Signature cards in the US?

How goes the switch to Chip & Signature cards in the US?

How goes the switch to Chip & Signature cards in the US?

With the deadline for the switchover now just months away, how are vendors doing? Have they begun the conversion already, or will they likely be scrambling at the last minute?

Lysa Myers01 Jun 20153 min. read


How To

The future of security in healthcare: Mobile devices

The future of security in healthcare: Mobile devices

How To

The future of security in healthcare: Mobile devices

The pressure for businesses to allow their employees to access work resources with their personal mobile devices may be overwhelming. How can healthcare IT and Security staff implement this without giving criminals the keys to the castle?

Lysa Myers20 Mar 20155 min. read


How To

Premera Breach: Healthcare businesses in the crosshairs

Premera Breach: Healthcare businesses in the crosshairs

How To

Premera Breach: Healthcare businesses in the crosshairs

Criminals are targeting medical records because of their value, and as a result, medical breaches are the fastest growing type of breach. What can healthcare businesses do to get themselves out of the crosshairs?

Lysa Myers18 Mar 20153 min. read


Cybercrime

Women in Federal cybersecurity - How did they get their start?

Women in Federal cybersecurity - How did they get their start?

Cybercrime

Women in Federal cybersecurity - How did they get their start?

While there may still be only a handful of women in Information Security, they can be found in increasing numbers in important, high-profile positions. In this post we look at how three women in Federal cybersecurity got their start.

Lysa Myers13 Mar 20154 min. read


Digital Security

Security terms explained: What does Zero Day mean?

Security terms explained: What does Zero Day mean?

Digital Security

Security terms explained: What does Zero Day mean?

One of the terms I’m most often asked to explain is what a “zero day” vulnerability or exploit is; let’s look at what that phrase entails.

Lysa Myers11 Feb 20153 min. read


Malware

Patch Now - Adobe Vulnerabilities Under Attack

Patch Now - Adobe Vulnerabilities Under Attack

Malware

Patch Now - Adobe Vulnerabilities Under Attack

This has not been a great week for Adobe; they have been scrambling to fix a number of critical vulnerabilities in their Flash Player product that are being used in active attacks. But a patch is now available to cover all these vulnerabilities - so patch now!

Lysa Myers06 Feb 20152 min. read


Cybercrime

Anthem breach: 5 defensive tips to take now

Anthem breach: 5 defensive tips to take now

Cybercrime

Anthem breach: 5 defensive tips to take now

Yesterday the Anthem breach, the biggest healthcare-related breach to date was announced, as attackers accessed a database containing the records of current and former employees. As we discussed earlier this morning on We Live Security, this could affect as many as 80 million people.

Lysa Myers05 Feb 20153 min. read


Malware

Do I need to worry about state-sponsored threats like Regin?

Do I need to worry about state-sponsored threats like Regin?

Malware

Do I need to worry about state-sponsored threats like Regin?

Since the discovery of Stuxnet several years ago, there has been a parade of targeted malware that may have been created or sponsored by nation states. Does an average person or business really need to worry about these things?

Lysa Myers26 Nov 20143 min. read