Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Better Cyber Hygiene is Critical to Preventing a Damaging Cyberattack
BrandPost OneNeck IT Solutions

Better Cyber Hygiene is Critical to Preventing a Damaging Cyberattack


Using TLS to Avoid Detection is On the Rise

Using TLS to Avoid Detection is On the Rise

Hiding in encrypted traffic is the newest way to breach a network and do damage. Here’s how security leaders can guard against this tricky tactic.

Combine XDR with Human Threat Hunters to Help Halt Cyber Attacks

Combine XDR with Human Threat Hunters to Help Halt Cyber Attacks

Stealthy hackers use common IT tools to pull off exploits and move around in networks. XDR, combined with skilled human threat detection, recently helped thwart a potentially damaging attack.

What’s Your Plan if Ransomware Hits?

What’s Your Plan if Ransomware Hits?

Trained staff and a modern tool set can help security teams move beyond mere prevention and into proactive detection.

Simply Protecting Yourself is No Longer Enough

Simply Protecting Yourself is No Longer Enough

Today’s security strategy requires getting proactive and searching for threats before they find you

Changing the Narrative Around Attack Victim Shaming

Changing the Narrative Around Attack Victim Shaming

Making end users feel bad about falling for social engineering attacks is not a productive way to shore up defenses.

Don’t Make Haste! The Downside of Rushing Attribution

Don’t Make Haste! The Downside of Rushing Attribution

Collecting the wrong indicators of compromise (IOCs) can actually do more harm than good.

How Criminals Abuse Common Security Tools – and Use Them Against You

How Criminals Abuse Common Security Tools – and Use Them Against You

By utilizing legitimate programs and tools, criminals can hide in plain sight on the network, causing significant damage

Mitigating Security Threats on Nontraditional Platforms

Mitigating Security Threats on Nontraditional Platforms

Just because it doesn’t look like a computer, doesn’t mean it can’t be exploited. Here’s how to guard against attacks on nontraditional devices

The Way Forward: 5 Security Fixes to Support a Hybrid Workforce

Work from home and newer hybrid models will continue even after the pandemic. Here’s what to do now to ensure security keeps pace

Dirty Tricks: The Latest in Ransomware Tactics

Dirty Tricks: The Latest in Ransomware Tactics

New Conti ransomware is harder to find, and more damaging than previous types of attacks. But good security hygiene can help.

Healthcare Organizations: Moving to High Alert for Ransomware

Healthcare Organizations: Moving to High Alert for Ransomware

Often underfunded for security, healthcare organizations need to guard against increasingly common ransomware attacks using new techniques.

Load More