Joan Goodchild

Content Director

Joan Goodchild is a content director with IDG’s marketing services division. She is the former editor in chief of CSO and a veteran editor, writer and content strategist with 20+ years experience. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Connected RPA Delivers A Digital Workforce
BrandPost Blue Prism

Connected RPA Delivers A Digital Workforce


Why I did it: Former hacker Mitchell Frost explains his motivation

In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a...

Telltale signs of ATM skimming

Telltale signs of ATM skimming

ATM skimming schemes involve installing fraudulent equipment that criminals use to steal credit and debit card numbers and PINs. Industry estimates calculate that ATM fraud costs banks and consumers billions of dollars annually. Here...

9 tips, tricks and must-haves for security awareness programs

9 tips, tricks and must-haves for security awareness programs

What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.

IntegriCell's Aaron Turner: Security managers still don't get mobile security

For the past several months, security veteran Aaron Turner has been making the rounds at industry events presenting some pretty disturbing information about the state of mobile security.

9 classic hacking, phishing and social engineering lies

9 classic hacking, phishing and social engineering lies

Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want

Rogues gallery: 9 infamous social engineers

Rogues gallery: 9 infamous social engineers

Social engineers, or "human hackers," have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes.

How Blackstone is finding BYOD success with BYOA(pple)

Bill Murphy, CTO and managing director at Blackstone, a global investment and advisory firm, knew he wanted to find a way to allow employees to use their own devices for work. The demand was there, and he was increasingly hearing...

Inside an IT asset disposal facility

Inside an IT asset disposal facility

A look at the machines and steps taken inside the Las Vegas-based facility of U.S. Micro, an IT asset disposition company, as they disassemble, destroy and then recycle IT assets securely.

How Colorado's CISO is revamping the state's information security -- on a $6,000 budget

Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was...

How Colorado's CISO is revamping the state's information security -- on a $6,000 budget

Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was...

20 notorious worms, viruses and botnets

The earliest worms and viruses were created for geeky fun and did little harm - oh, how times have changed. Here are 20 worms, viruses and botnets that show the evolution of malware, from Creeper to Flame.

Load More