Deb Radcliff

Deb Radcliff is an investigative journalist and analyst focused on computer crime and security. She is currently in production on her first cyber thriller, Breaking Backbones, with Archway Publishing.

10 pioneering women in information security

3 best practices to protect sensitive data in the cloud

3 best practices to protect sensitive data in the cloud

Follow these three essential best practices to protect customer or proprietary data in cloud apps and infrastructure.

CISO job search: What to look (and look out) for

CISO job search: What to look (and look out) for

Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.

Privacy, data protection regulations clamp down on biometrics use

Privacy, data protection regulations clamp down on biometrics use

The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication.

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.

Who should be responsible for financial fraud?

Improvements in payment protections are shifting the liability for fraud to the least-secure party

Pentagon Taps Contractors for ID Card Help

Having issued 3.3 million physical and logical access cards that are a precursor to those mandated under Homeland Security Presidential Directive 12, the Defense Department last year began turning its attention to authenticating...

Polymorphic Malware: A Threat That Changes on the Fly

Polymorphic malware changes shape to fool detection schemes

Watch Out for PHP Holes

By the end of last year, some 2,100 PHP-related vulnerabilities existed in the ISS database of known vulnerabilities.

How to Prevent, Detect or Remove Rootkits

What you need to know about rootkits

Federated Identity Management: Flying Duo

Boeing and Southwest's partnership teams federated identity management with Web-based application access

Load More