Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Simply Protecting Yourself is No Longer Enough
BrandPost Sophos

Simply Protecting Yourself is No Longer Enough


Changing the Narrative Around Attack Victim Shaming

Changing the Narrative Around Attack Victim Shaming

Making end users feel bad about falling for social engineering attacks is not a productive way to shore up defenses.

Don’t Make Haste! The Downside of Rushing Attribution

Don’t Make Haste! The Downside of Rushing Attribution

Collecting the wrong indicators of compromise (IOCs) can actually do more harm than good.

How Criminals Abuse Common Security Tools – and Use Them Against You

How Criminals Abuse Common Security Tools – and Use Them Against You

By utilizing legitimate programs and tools, criminals can hide in plain sight on the network, causing significant damage

Mitigating Security Threats on Nontraditional Platforms

Mitigating Security Threats on Nontraditional Platforms

Just because it doesn’t look like a computer, doesn’t mean it can’t be exploited. Here’s how to guard against attacks on nontraditional devices

The Way Forward: 5 Security Fixes to Support a Hybrid Workforce

Work from home and newer hybrid models will continue even after the pandemic. Here’s what to do now to ensure security keeps pace

Dirty Tricks: The Latest in Ransomware Tactics

Dirty Tricks: The Latest in Ransomware Tactics

New Conti ransomware is harder to find, and more damaging than previous types of attacks. But good security hygiene can help.

Healthcare Organizations: Moving to High Alert for Ransomware

Healthcare Organizations: Moving to High Alert for Ransomware

Often underfunded for security, healthcare organizations need to guard against increasingly common ransomware attacks using new techniques.

What’s Next in Battling Ransomware? Human-driven Threat Hunting

What’s Next in Battling Ransomware? Human-driven Threat Hunting

Most organizations can defend against malicious code, but today’s security strategy must monitor for malicious behaviors. The answer: human-driven threat hunting and managed threat response.

Episode 4: Reduce SOC burnout

Episode 4: Reduce SOC burnout

Episode 4 - Listen to the podcast to learn more about the expanding threat landscape and how security leaders can reduce SOC burnout and enable security teams to be proactive and preventive threat hunters with a modern threat...

Episode 3: The Zero Trust Model

Episode 3: The Zero Trust Model

Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...

Episode 2: Empowering employees to be secure and productive

Episode 2: Empowering employees to be secure and productive

Episode 2: When it comes to protecting your business, security is a team sport. Criminal hackers –increasingly sophisticated and persistent – are playing offense, trying to find weak spots to breach an organization. And everyone in...

Load More