Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She writes about information security and strategy and is the former editor in chief of CSO.

Tip

3 tips for using the social engineering toolkit

Two years ago, Dave Kennedy, a penetration tester, social engineering expert and contributor to the website social-engineer.com, wanted to create a tool for pen testers to simulate social engineering attacks.

Social engineering goes to the movies

If you fall for a social engineer's trickery, it's embarrassing.

Rogues gallery: 9 infamous social engineers

Social engineers, or "human hackers," have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes.

Making the case for preventing workplace violence

According to U.S. Bureau of Justice statistics, the rate of nonfatal workplace violence declined by 35 percent from 2002-2009. But, despite the decline, a recent survey conducted for AlliedBarton Security Services found over half of...

Security managers split on BYOD, skeptical of Android devices

New survey results from IT security community Wisegate finds no consistent plan in place across enterprises for allowing and securing user-owned devices.

Surveillance technology for investigations and crowd control

As the second-largest metropolitan area in the United States, Los Angeles is home to four million residents and the mecca for most of the entertainment industry's high-profile events. The almost constant stream of celebrity-infused...

Why CloudFlare kept LulzSec safe

On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the...

Why we kept LulzSec safe

On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the...

How to sneak into a security conference

When I checked in at the RSA 2012 conference, I was directed to wear my badge at all times.

Stress and burnout in infosec careers

Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with info sec career...

RSA Conference 2012: Stress and burnout in infosec careers

Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with info sec career...

Tip

10 tips for offsite meeting security

When an organization hosts an offsite event, whether it is a small meeting, or a massive industry conference, it also presents an opportunity for the security department.

2011 Women of Influence award winners named

The 2011 Executive Women's Forum "Women of Influence" Awards were celebrated recently at the annual EWF event in Scottsdale, Arizona.

By the numbers: How dangerous are Facebook, Twitter, and search engines (really)?

In his presentation titled "The dark side: Measuring and analyzing malicious activity on Twitter and Facebook," Daniel Peck, research scientist with Barracuda Networks, delves into the details of how cybercriminals trap people on...

The new age of malware

Smart devices, social media and increased online activity through app stores and other transaction-based websites are coming together in what one researcher says is a scary combination of factors that have dire implications for...

Skype flaw reveals users' location, file-downloading habits

Researchers have found a flaw in Skype, the popular Voice-over-Internet-Protocol service which allows users to make video phone calls and internet chat with their computers. The vulnerability can expose your location, identity and the...

Facebook users flooded with adult images in mystery hack

For the past several days, many Facebook users have been seeing adult images in their news feeds that feature pornography, violence and animal abuse -- the result of what security analysts say is a mystery attack.

Most fraud is an inside job, says survey

Fraud cost organizations 2.1 percent of earnings in the past 12 months, which is equivalent to a week of revenues over the course of a year, according to the Kroll Annual Global Fraud Report, a recent survey that polled more than...

Business continuity spending not a top budget priority

Organizations continue to spend on business continuity and disaster recovery, but BC/DR is still not a budget top priority, according to newly-released data from Forrester Research.

Social engineering: My career as a professional bank robber

Jim Stickley got his first computer at age 12, and he was chatting with other computer "nerds" on bulletin board sites by the time he was 16. A wannabe hacker, Stickley said his first foray into playing the system was with free codes...

Load More