Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Flaw Fix Rates Are Low - How Can They Be Improved?

In this episode we discuss the latest findings on flaw fix rates in enterprises. Chris Eng, Vice President of Research, Veracode, offers perspective on what figures in the State of Software Security report reveal about the troubling...

Open Source Components Continue to Thwart Enterprises

In this episode, we’ll discuss why enterprises still struggle with the occurrence of vulnerable open source components within their software - and what they can do to mitigate these risks. Listeners will learn more about: • The...

Building a Security-first Culture Starts with Coding

In this episode, we learn about changes in application security and the partnership between development and security. Chris Wysopal, Chief Technology Officer and Co-Founder of Veracode, joins us to discuss the synergy between these...

The clean desk test

The clean desk test

Ten ways a messy desk puts confidential information at risk.

Rising Breach Rate Drives Businesses Toward Zero Trust Security Model

Rising Breach Rate Drives Businesses Toward Zero Trust Security Model

Increased security budgets and new technologies have not stopped breach numbers from climbing higher. The Zero Trust models offers a new way of approaching security and identity management.

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention

IoT, Cloud, or Mobile: All Ripe for Exploit and Need Security’s Attention

Research on tech spending plans for the year ahead show cloud, mobile and Internet of Things security are all priorities. As these investments grow, so do concerns about cybersecurity. According to IDC, the potential cybersecurity...

Why CSOs and CISOs need to care about machine learning

Why CSOs and CISOs need to care about machine learning

Michael A. Davis of CounterTack explains the security challenges around machine learning, and how some of the issues can be solved for free (yes, free!)

CSO50 winners remain a step ahead

CSO50 winners remain a step ahead

Check out the 50 winners to be lauded at CSO's annual award ceremony. This year’s winners are designing security to stay in front of modern threats.

Realistic ways to lock down IoT

Realistic ways to lock down IoT

How CSOs can best secure and understand IoT devices that enter their organization's network infrastructure

Follow the money! Where VC security investment is occurring

Follow the money! Where VC security investment is occurring

Where is investment happening now in security? Jeff Fagan, the founder of Accomplice, tells us about priorities in VC funding today

Phishing campaign uses Yahoo breach to hook email

Phishing campaign uses Yahoo breach to hook email

A phishing email sent out within hours after the Yahoo breach news broke is preys on users' concern about their account security

Why the CSO needs to be involved in active shooter prep

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at...

The rise of ransomware-as-a-service

The rise of ransomware-as-a-service

Ransomware is a lucrative, growing business for online criminals. Stu Sjouwerman from KnowBe4 explains why

What can CSOs learn from the Dyn attacks?

What can CSOs learn from the Dyn attacks?

BitSight co-founder Stephen Boyer chats with CSO about key takeaways from the DNS attacks on Dyn, and how to prepare for future attacks

Keeping the C-suite from getting speared by phishing

Keeping the C-suite from getting speared by phishing

Executives are some of the biggest targets- and sometimes the easiest prey - for spear phishing criminals. Here are tips for how security managers can go beyond awareness training to keep the top-level out of danger

How to prepare for a data breach

How to prepare for a data breach

Tips and tricks for preparing a data breach response plan

How CSOs can better manage third-party risks

How CSOs can better manage third-party risks

Scott Schneider from CyberGRX chats with CSO about how security managers can secure their data when dealing with third-party vendors.

What CSOs can learn from the Yahoo data breach

What CSOs can learn from the Yahoo data breach

Kevin O’Brien from GreatHorn chats with CSO about the takeaways for security leaders

Why your employees are still a huge security risk

Why your employees are still a huge security risk

Michael Bruemmer from Experian Data Breach Resolution joins CSO to chat about companies not being tough enough on employees who break security protocols.

Why you need tiered security training for IT staff

Why you need tiered security training for IT staff

What's the difference in training for IT staff members and the IT security team?

Load More