

Deb Radcliff
Deb Radcliff is an investigative journalist and analyst focused on computer crime and security. She is author of the popular cyber thriller series, “Breaking Backbones,” available at Amazon.

The metaverse brings a new breed of threats to challenge privacy and security gatekeepers
If your organization isn’t already moving into the metaverse, it soon will be. Be warned: today’s security protocols and privacy laws may not apply to 3D worlds.

The BISO: bringing security to business and business to security
Even the most tech-savvy leaders can use an effective liaison between corporate and cybersecurity—the business information security officer (BISO) bridges communications gaps and acts as a security evangelist and gatekeeper.

When blaming the user for a security breach is unfair – or just wrong
Training non-tech savvy users to recognize phishing and other credential-based attacks is essential but expecting employees to man the front lines against intrusions is a mistake, experts say. Harmony between staff psychology and...

Build a mature approach for better cybersecurity vendor evaluation
Establishing a thorough, well-planned in-house strategy for assessing cybersecurity vendors and their products is a hallmark of an organization’s maturity and can avoid hassles, headaches, and unnecessary expense.

Why CISO roles require business and technology savvy
Listening and communicating to both the technical and business sides is critical to successfully leading IT teams and business leaders to the same end-goal.

The deepfake danger: When it wasn’t you on that Zoom call
Deepfakes pose a real threat to security and risk management and it’s only going to get worse as the technology develops and bad actors can access malicious offerings such as deepfakes as a service.

How the US DHS develops hard-to-find cybersecurity skills
The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.

How the Russia-Ukraine war makes ransomware payments harder
The war in Ukraine has increased sanctions against paying ransom demands to cybercriminal groups and cryptocurrency intermediaries based in Russia.

How a new generation of IoT botnets is amplifying DDoS attacks
IoT botnets are not new. Nor are DDoS attacks. But the two are on a trajectory that is raising the stakes in DDoS protection and bot takeover prevention.

10 pioneering women in information security
As Women's History Month comes to close, we introduce you (hopefully not for the first time) to some women who broke new ground in infosec, national security, and computer science.

3 best practices to protect sensitive data in the cloud
Follow these three essential best practices to protect customer or proprietary data in cloud apps and infrastructure.