Quantcast
Channel: CSO Online Lysa Myers
Browsing latest articles
Browse All 12 View Live

The practicality of the Cyber Kill Chain approach to security

If you're one of those folks who read a lot of InfoSec news, you've no doubt heard a lot of mention of the effectiveness of a Cyber Kill Chain approach to security. If you managed to miss the hubbub,...

View Article



IDG Contributor Network: Welcome to the Digital Mystique

Coming up with the title for a blog is always a tricky process. How do you best explain the direction and purpose in just a couple of words? I chose the name “Digital Mystique” for a number of...

View Article

IDG Contributor Network: Myths and truths about employing women in Infosec

I’m sure you’ve read the statistics about how women make up only 11 percent of the information security workforce, and how 56 percent of women who start a career in tech leave it at the mid-point. And...

View Article

IDG Contributor Network: The Paradox of STEM Training

In the technology industry, we’re faced with something of a paradox: On the one hand, statistics show that colleges and universities are pumping out STEM graduates at a prodigious rate. (Perhaps too...

View Article

IDG Contributor Network: Five security developments we can be thankful for in...

It’s not often that we take a moment to think about what we in security are grateful for. And as we approach the time of year when all the security gurus bring out their crystal balls and...

View Article


IDG Contributor Network: Going beyond gender for the agenda

In a time where tech conferences with all-male lineups are generating a lot of controversy over the lack of female speakers, you might wonder what it would be like to put on a tech conference with a...

View Article

IDG Contributor Network: When good security advice...isn't

Have you ever had one of those moments, while discussing security techniques with other clueful individuals, where one of you confesses to disagreeing with a common piece of advice? But the truth is,...

View Article

IDG Contributor Network: After the Anthem breach: How we can help secure...

In the absence of context, the Anthem breach may seem baffling or inexcusable: Why would anyone steal data from a healthcare business? Why weren’t they monitoring their data more carefully?But with a...

View Article


IDG Contributor Network: For women to avoid 'office housework', work from home

Have you ever had one of those days at work where someone was coming over to talk to you about something every few minutes, and it took you forever to get anything done? Workplace distractions are a...

View Article


IDG Contributor Network: Ensuring data security with a bucket of worms and a...

Someone recently asked me a question about data destruction, which got me thinking: What is it that works for me, and for other security-minded people, to get us in the habit of destroying sensitive...

View Article

Image may be NSFW.
Clik here to view.

9 creative ways to destroy sensitive data

Let's get more imaginative than this. Here are 9 ways to destroy data in HGTV styleImage by Bertram Nudelbach There are lots of lovely technologies out there that will wipe and shred everything till...

View Article

IDG Contributor Network: Can pseudonyms be friendly and authentic?

There was quite a ruckus a month ago surrounding Facebook’s effort to crack down on pseudonyms, which affected a lot of performers, transgender people, Native Americans, Hawaiians and others with...

View Article
Browsing latest articles
Browse All 12 View Live


Latest Images