Joan Goodchild

Editor-in-Chief

Joan Goodchild, former editor in chief of CSO, is a veteran editor and writer with 20+ years experience. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Rising Breach Rate Drives Businesses Toward Zero Trust Security Model

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention

Research on tech spending plans for the year ahead show cloud, mobile and Internet of Things security are all priorities. As these investments grow, so do concerns about cybersecurity. According to IDC, the potential cybersecurity...

What is social engineering? How criminals take advantage of human behavior

What is social engineering? How criminals take advantage of human behavior

Social engineering is essentially the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Here are answers to some frequently asked...

Why CSOs and CISOs need to care about machine learning

Why CSOs and CISOs need to care about machine learning

Michael A. Davis of CounterTack explains the security challenges around machine learning, and how some of the issues can be solved for free (yes, free!)

CSO50 winners remain a step ahead

CSO50 winners remain a step ahead

Check out the 50 winners to be lauded at CSO's annual award ceremony. This year’s winners are designing security to stay in front of modern threats.

Realistic ways to lock down IoT

Realistic ways to lock down IoT

How CSOs can best secure and understand IoT devices that enter their organization's network infrastructure

Follow the money! Where VC security investment is occurring

Follow the money! Where VC security investment is occurring

Where is investment happening now in security? Jeff Fagan, the founder of Accomplice, tells us about priorities in VC funding today

Phishing campaign uses Yahoo breach to hook email

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security

Why the CSO needs to be involved in active shooter prep

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at...

The rise of ransomware-as-a-service

The rise of ransomware-as-a-service

Ransomware is a lucrative, growing business for online criminals. Stu Sjouwerman from KnowBe4 explains why

What can CSOs learn from the Dyn attacks?

What can CSOs learn from the Dyn attacks?

BitSight co-founder Stephen Boyer chats with CSO about key takeaways from the DNS attacks on Dyn, and how to prepare for future attacks

Keeping the C-suite from getting speared by phishing

Keeping the C-suite from getting speared by phishing

Executives are some of the biggest targets- and sometimes the easiest prey - for spear phishing criminals. Here are tips for how security managers can go beyond awareness training to keep the top-level out of danger

Load More