Stories by Joan Goodchild

Joan Goodchild's image

Why we kept LulzSec safe

On June 2nd, 2011, the antisec hacker group known as <a href="http://www.csoonline.com/article/684351/lulzsec-on-a-rampage">LulzSec</a> launched a web site. Although they had been an active hacking group for several weeks, the creation of Lulzsecurity.com was their first official web presence other than the Twitter account they had been using.

Joan Goodchild | 01 Mar | Read more

RSA Conference 2012: Stress and burnout in infosec careers

Career stress and burnout is as common among information security professionals as it is among professionals in other high-stress fields, such as medicine or law. But finding support and information on dealing with <a href="http://www.csoonline.com/topic/41515/security-career-staffing">info sec career</a> burnout is difficult because resources and knowledge are scant.

Joan Goodchild | 28 Feb | Read more

12 tips for implementing GRC

Driven largely by compliance requirements for the <a href="http://www.csoonline.com/article/632218/the-security-laws-regulations-and-guidelines-directory">Sarbanes-Oxley Act of 2002</a>, many organizations are adopting a <a href="http://www.csoonline.com/article/674709/it-grc-tools-control-your-environment">governance, risk and compliance</a> (GRC) tools to help manage their activities in these three areas. GRC suites and toolsets automate the collection, correlation and reporting of information to offer a broader picture of how well the company is not only performing, but also how well it is complying with the law and managing risk.

Joan Goodchild | 24 Feb | Read more

Facebook may be scary, but we love it anyway: research

As a research scientist for Barracuda networks, Daniel Peck has spent much of his time in the last year looking at activity on social networks and analyzing the common tactics used to scam, phish and otherwise trick people into clicking on bad links. A break down of the malicious activity on social networks can be found in By the numbers: How dangerous are Facebook, Twitter, search results (really)?

Joan Goodchild | 09 Dec | Read more

By the numbers: How dangerous are Facebook, Twitter, and search engines (really)?

In his presentation titled "The dark side: Measuring and analyzing <a href="http://www.csoonline.com/article/497076/5-facebook-twitter-scams-to-avoid">malicious activity on Twitter and Facebook</a>," Daniel Peck, research scientist with <a href="http://www.barracudanetworks.com/ns/?L=en">Barracuda Networks</a>, delves into the details of how cybercriminals trap people on social networks. Peck's research also uncovered that user perceptions of <a href="http://www.csoonline.com/topic/587704/social-networking-security">social networking security</a> contrasts drastically with actual membership rates, which you can read about in <a href="http://www.csoonline.com/article/696138">Facebook may be scary, but we love it anyway</a>.

Joan Goodchild | 09 Dec | Read more

4 steps retailers can take to combat flash robs

As the start of <a href="http://www.csoonline.com/article/510792/the-12-cons-of-christmas">holiday shopping season</a> kicks off, retailers know they will no doubt deal with inevitable amounts of theft this year, particularly in a difficult economy. But this season, news of a phenomenon known as flash robbing is putting a new twist on smash-and-grab tactics.

Joan Goodchild | 30 Nov | Read more

Most fraud is an inside job, says survey

Fraud cost organizations 2.1 percent of earnings in the past 12 months, which is equivalent to a week of revenues over the course of a year, according to the Kroll Annual Global Fraud Report, a recent survey that polled more than 1,200 senior executives worldwide.

Joan Goodchild | 10 Nov | Read more

BC/DR spending not a top budget priority

Organizations continue to spend on <a href="http://www.csoonline.com/topic/41248/business-continuity">business continuity</a> and disaster recovery, but BC/DR is still not a budget top priority, according to newly-released data from Forrester Research.

Joan Goodchild | 02 Nov | Read more

Big-name companies easy target for social engineers

For a second year, participating hackers took part in a <a href="http://www.csoonline.com/topic/587703/social-engineering">social-engineering</a>, capture-the-flag event this summer's at Defcon 19 security conference. And a newly-released summary of findings from the exercise reveal organizations are highly vulnerable to social engineering.

Joan Goodchild | 01 Nov | Read more

Social engineering: My career as a professional bank robber

Jim Stickley got his first computer at age 12, and he was chatting with other computer "nerds" on <a href="http://www.csoonline.com/article/688790/nokia-developer-forum-hacked-still-unavailable">bulletin board sites</a> by the time he was 16. A wannabe hacker, Stickley said his first foray into playing the system was with free codes -- codes that would exclude his phone and computer time from racking up charges that would incur the wrath of his parents.

Joan Goodchild | 27 Oct | Read more

Security on a shoestring budget

According to figures released recently by Kaspersky Lab, 1300 IT pros were asked about IT risks and security spending. Among large companies, the average security budget is $3.35 million, according to Kaspersky's data.

Joan Goodchild | 12 Oct | Read more