Deb Radcliff

Deb Radcliff is an investigative journalist and analyst focused on computer crime and security. She is author of the popular cyber thriller series, “Breaking Backbones,” available at Amazon.

Build a mature approach for better cybersecurity vendor evaluation

Why CISO roles require business and technology savvy

Why CISO roles require business and technology savvy

Listening and communicating to both the technical and business sides is critical to successfully leading IT teams and business leaders to the same end-goal.

The deepfake danger: When it wasn’t you on that Zoom call

The deepfake danger: When it wasn’t you on that Zoom call

Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.

5 ways to unite security and compliance

5 ways to unite security and compliance

Which comes first, security or compliance? In an ideal world, they work together seamlessly. Here's how to achieve that.

How the US DHS develops hard-to-find cybersecurity skills

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

How the Russia-Ukraine war makes ransomware payments harder

How the Russia-Ukraine war makes ransomware payments harder

The war in Ukraine has increased sanctions against paying ransom demands to cybercriminal groups and cryptocurrency intermediaries based in Russia.

How a new generation of IoT botnets is amplifying DDoS attacks

How a new generation of IoT botnets is amplifying DDoS attacks

IoT botnets are not new. Nor are DDoS attacks. But the two are on a trajectory that is raising the stakes in DDoS protection and bot takeover prevention.

10 pioneering women in information security

10 pioneering women in information security

As Women's History Month comes to close, we introduce you (hopefully not for the first time) to some women who broke new ground in infosec, national security, and computer science.

3 best practices to protect sensitive data in the cloud

3 best practices to protect sensitive data in the cloud

Follow these three essential best practices to protect customer or proprietary data in cloud apps and infrastructure.

CISO job search: What to look (and look out) for

CISO job search: What to look (and look out) for

Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.

Privacy, data protection regulations clamp down on biometrics use

Privacy, data protection regulations clamp down on biometrics use

The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication.

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

Load More