Deb Radcliff

Deb Radcliff is an investigative journalist and analyst focused on computer crime and security. She is author of the popular cyber thriller series, “Breaking Backbones,” available at Amazon.

3 best practices to protect sensitive data in the cloud

3 best practices to protect sensitive data in the cloud

Follow these three essential best practices to protect customer or proprietary data in cloud apps and infrastructure.

CISO job search: What to look (and look out) for

CISO job search: What to look (and look out) for

Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.

Privacy, data protection regulations clamp down on biometrics use

Privacy, data protection regulations clamp down on biometrics use

The highly sensitive nature of biometric data and new regulations aimed to protect it are cause to rethink how it's used for authentication.

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Avoiding the snags and snares in data breach reporting: What CISOs need to know

Ambiguities in a growing list of US reporting requirements keep CISOs up at night: Will they be compelled to report every breach even if they can prove the data was untouched? Experts advise on how to avoid trouble.

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

Uber breach case a ‘watershed moment’ for CISOs’ liability risk

An upcoming case to determine whether the former Uber CSO failed to report a breach puts the legal liabilities of being a CISO in the spotlight. CISOs have a few options to minimize that risk.

Who should be responsible for financial fraud?

Improvements in payment protections are shifting the liability for fraud to the least-secure party

Pentagon Taps Contractors for ID Card Help

Having issued 3.3 million physical and logical access cards that are a precursor to those mandated under Homeland Security Presidential Directive 12, the Defense Department last year began turning its attention to authenticating...

Polymorphic Malware: A Threat That Changes on the Fly

Polymorphic malware changes shape to fool detection schemes

Watch Out for PHP Holes

By the end of last year, some 2,100 PHP-related vulnerabilities existed in the ISS database of known vulnerabilities.

Identity Management in the Real World

What's identity management? Ask 20 vendors, get 20 answers. But CSOs aren't waiting for a universal definition; they're busy tackling whatever projects meet their business needs.

Why Identity Management

Ultimately IDM can pay off in time and money

Federated Identity Management: Flying Duo

Boeing and Southwest's partnership teams federated identity management with Web-based application access

Details: A Scenarios Played Out In The Financial Services ISAC Tabletop Exercise In April

For security simulations

Hold The Phone

The telecommunications industry has had its own sort of Information Sharing and Analysis Center ever since 1984, when the government set up a federal emergency telecom office. Several iterations later, the telecom industry's disaster...

Security Simulations: This Is Only A Test

Security simulations and tabletop exercises help CSOs practice and plan the best response for worst-case scenarios.

Load More