Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She writes about information security and strategy and is the former editor in chief of CSO.

Rogues gallery 2: ten infamous hacks and hackers

From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them)

Tip

3 tips for using the social engineering toolkit

Two years ago, Dave Kennedy, a penetration tester, social engineering expert and contributor to the website social-engineer.com, wanted to create a tool for pen testers to simulate social engineering attacks.

Social engineering goes to the movies

If you fall for a social engineer's trickery, it's embarrassing.

Social engineering goes to the movies

If you fall for a social engineer's trickery, it's embarrassing.

Rogues gallery: 9 infamous social engineers

Social engineers, or "human hackers," have been duping victims from the very beginning of human existence. Here are nine infamous con artists who made history with their scams and schemes.

Making the case for preventing workplace violence

According to U.S. Bureau of Justice statistics, the rate of nonfatal workplace violence declined by 35 percent from 2002-2009. But, despite the decline, a recent survey conducted for AlliedBarton Security Services found over half of...

Making the case for preventing workplace violence

According to U.S. Bureau of Justice statistics, the rate of nonfatal workplace violence declined by 35 percent from 2002-2009. But, despite the decline, a recent survey conducted for AlliedBarton Security Services found over half of...

Security managers split on BYOD, skeptical of Android devices

CSOs, CISOs and other security managers are not embracing the bring-your-own-device movement set into motion by demanding employees, but they aren't refusing to allow user-owned smartphones and tablets into the work place either.

Security managers split on BYOD, skeptical of Android devices

New survey results from IT security community Wisegate finds no consistent plan in place across enterprises for allowing and securing user-owned devices.

Surveillance technology for investigations and crowd control

As the second-largest metropolitan area in the United States, Los Angeles is home to four million residents and the mecca for most of the entertainment industry's high-profile events. The almost constant stream of celebrity-infused...

Why CloudFlare kept LulzSec safe

On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the...

Why we kept LulzSec safe

On June 2nd, 2011, the antisec hacker group known as LulzSec launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the...

How to sneak into a security conference

When I checked in at the RSA 2012 conference, I was directed to wear my badge at all times.

How to sneak into a security conference

When I checked in at the RSA 2012 conference, I was directed to wear my badge at all times.

Stress and burnout in infosec careers

Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with info sec career...

RSA Conference 2012: Stress and burnout in infosec careers

Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with info sec career...

Tip

10 tips for offsite meeting security

When an organization hosts an offsite event, whether it is a small meeting, or a massive industry conference, it also presents an opportunity for the security department.

2011 Women of Influence award winners named

The 2011 Executive Women's Forum "Women of Influence" Awards were celebrated recently at the annual EWF event in Scottsdale, Arizona.

By the numbers: How dangerous are Facebook, Twitter, and search engines (really)?

In his presentation titled "The dark side: Measuring and analyzing malicious activity on Twitter and Facebook," Daniel Peck, research scientist with Barracuda Networks, delves into the details of how cybercriminals trap people on...

The new age of malware

Smart devices, social media and increased online activity through app stores and other transaction-based websites are coming together in what one researcher says is a scary combination of factors that have dire implications for...

Load More