Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Dirty Tricks: The Latest in Ransomware Tactics

Healthcare Organizations: Moving to High Alert for Ransomware

Healthcare Organizations: Moving to High Alert for Ransomware

Often underfunded for security, healthcare organizations need to guard against increasingly common ransomware attacks using new techniques.

What’s Next in Battling Ransomware? Human-driven Threat Hunting

What’s Next in Battling Ransomware? Human-driven Threat Hunting

Most organizations can defend against malicious code, but today’s security strategy must monitor for malicious behaviors. The answer: human-driven threat hunting and managed threat response.

Episode 4: Reduce SOC burnout

Episode 4: Reduce SOC burnout

Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...

Episode 3: The Zero Trust Model

Episode 3: The Zero Trust Model

Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...

Episode 2: Empowering employees to be secure and productive

Episode 2: Empowering employees to be secure and productive

Episode 2: When it comes to protecting your business, security is a team sport. Criminal hackers –increasingly sophisticated and persistent – are playing offense, trying to find weak spots to breach an organization. And everyone in...

Episode 1: Balancing act

Episode 1: Balancing act

Episode 1: In this episode of the Strengthen and Streamline Your Security podcast, we look at how an identity-based security framework can help organizations let users work from anywhere while securing them seamlessly. We’ll hear...

Frequency matters: the case for scanning early and often, part 2

Security debt – which is defined as aging and accumulating flaws in software -- is a lot like credit card debt. You can throw money at the balance, but if you don’t stop spending, you’re never going to actually get out of debt. ...

Frequency matters: the case for scanning early and often, part 1

The latest Veracode State of Software Security report reveals that scanning early, often, and steadily helps you fix more flaws faster while not contributing to security debt. The report finds 56 percent of software flaws eventually...

AppSec grows up

AppSec awareness has grown in a decade. In Veracode’s State of Software Security report, Volume one, most of the conversation was around trying to explain and advocate for application security. Today, far less of that is necessary and...

Security debt across sectors: behind the numbers

According to the latest State of Security Software report from Veracode, the retail industry has the lowest average number of unaddressed security flaws. Government and education have the largest “iceberg“ of security debt lurking...

Unresolved flaws: security debt grows deeper

The average number of days to fix software flaws was at 59 days in the first Veracode State of Software report from ten years ago. Today, it’s jumped to 171 days in the latest 2019 report. While typical median fix times haven't...

Load More