

Deb Radcliff
Deb Radcliff is an investigative journalist and analyst focused on computer crime and security. She is author of the popular cyber thriller series, “Breaking Backbones,” available at Amazon.


CISO job search: What to look (and look out) for
Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.

Privacy, data protection regulations clamp down on biometrics use
The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication.

Avoiding the snags and snares in data breach reporting: What CISOs need to know
Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

Uber breach case a ‘watershed moment’ for CISOs’ liability risk
An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.
Who should be responsible for financial fraud?
Improvements in payment protections are shifting the liability for fraud to the least-secure party
Pentagon Taps Contractors for ID Card Help
Having issued 3.3 million physical and logical access cards that are a precursor to those mandated under Homeland Security Presidential Directive 12, the Defense Department last year began turning its attention to authenticating...
Polymorphic Malware: A Threat That Changes on the Fly
Polymorphic malware changes shape to fool detection schemes
Watch Out for PHP Holes
By the end of last year, some 2,100 PHP-related vulnerabilities existed in the ISS database of known vulnerabilities.
Identity Management in the Real World
What's identity management? Ask 20 vendors, get 20 answers. But CSOs aren't waiting for a universal definition; they're busy tackling whatever projects meet their business needs.
Federated Identity Management: Flying Duo
Boeing and Southwest's partnership teams federated identity management with Web-based application access
Details: A Scenarios Played Out In The Financial Services ISAC Tabletop Exercise In April
For security simulations
Hold The Phone
The telecommunications industry has had its own sort of Information Sharing and Analysis Center ever since 1984, when the government set up a federal emergency telecom office. Several iterations later, the telecom industry's disaster...
Security Simulations: This Is Only A Test
Security simulations and tabletop exercises help CSOs practice and plan the best response for worst-case scenarios.