Stories by Joan Goodchild

Kimberly Clark names new CISO

By Joan Goodchild | 17 April, 2014 03:06

Timothy Youngblood, CISSP, has joined Kimberly Clark as their Chief Information Security Officer. Kimberly Clark is multi-national brand conglomerate with staple consumer products such as Kleenex, Pull-ups, and Scotts Towels.

Why I did it: Former hacker Mitchell Frost explains his motivation

By Joan Goodchild | 22 January, 2014 18:02

In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created. Authorities say between August 2006 and March 2007, Frost launched a series of denial of service (DDOS) attacks against several conservative web sites, including Billoreilly.com, Anncoulter.com and Rudy Giuliani's campaign site, Joinrudy2008.com. He is accused of taking down the O'Reilly site five times, as well as disrupting the University of Akron's network during a DDOS attack Frost allegedly launched on a gaming server hosted by the university.

How keylogging malware steals your information (includes video)

By Joan Goodchild | 15 July, 2013 19:22

George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data

In Pictures: Mobile security - How gadgets evolved

By Joan Goodchild | 09 July, 2013 08:52

Still got an old Blackberry or Compaq laying around? CSO Publisher (and packrat) Bob Bragdon does! Rummaging around Bragdon's attic (with some memory help from mobile office expert Catherine Roseberry) provides a look at how mobile device security has evolved.

9 tips, tricks and must-haves for security awareness programs

By Joan Goodchild | 21 June, 2013 14:53

What are the essential ingredients for making a security awareness program successful? Check out these 9 tips from CSO contributors on how to make awareness work in your organization.

IntegriCell's Aaron Turner: Security managers still don't get mobile security

By Joan Goodchild | 20 May, 2013 18:20

For the past several months, security veteran Aaron Turner has been making the rounds at industry events presenting some pretty disturbing information about the state of mobile security.

Women leaders in security recognized

By Joan Goodchild | 06 May, 2013 15:46

Each year, the Executive Women's Forum announces their "Women of Influence" Awards at their annual EWF event.

Social engineering in penetration tests: 6 tips for ethical (and legal) use

By Joan Goodchild | 23 April, 2013 22:12

Social engineering techniques are frequently part of an overall security penetration test; often used as a way to test an organization's so-called "human network."

Security and vulnerability assessment: 4 common mistakes

By Joan Goodchild | 08 April, 2013 18:21

If you're running a robust security program, you're regularly conducting security and vulnerability assessments of your both your network and physical environments. But in the quest to uncover security gaps and vulnerabilities, slip-ups are often made, too, that make these efforts less effective at having a positive impact.

In Pictures: 9 classic hacking, phishing and social engineering lies

By Joan Goodchild | 19 March, 2013 09:46

Whether it is on the phone, online or in person, here are ten lies hackers, phishers and social engineers will tell you to get what they want

How Blackstone is finding BYOD success with BYOA(pple)

By Joan Goodchild | 04 March, 2013 17:16

Bill Murphy, CTO and managing director at Blackstone, a global investment and advisory firm, knew he wanted to find a way to allow employees to use their own devices for work. The demand was there, and he was increasingly hearing about how adding in BYOD would help productivity.

How Colorado's CISO is revamping the state's information security -- on a $6,000 budget

By Joan Goodchild | 21 February, 2013 15:56

Before Jonathan Trull took over as Chief Information Security Office for the state of Colorado in 2012, he had already been working in the Colorado Office of the State Auditor for a decade. As the Deputy State Auditor, he was responsible for overseeing annual audits of the state's systems.

In Pictures: Security mistakes right at your workspace

By Joan Goodchild | 21 January, 2013 08:17

This workspace contains 10 security mistakes. Can you spot the errors that put confidential information at risk?

5 more tough security questions (and tips on answering them)

By Joan Goodchild | 09 January, 2013 17:47

At first glance, Eric Cowperthwaite, Chief Security Officer at Providence Health and Services in Renton, Washington, doesn't care how excellent a job candidate's credentials and experience look on paper. He wants to see how much of an impression they make on his team.

5 tips to retain great security talent

By Joan Goodchild | 18 December, 2012 00:11

You want the best on your security team. And once you've got them, you want to keep them happy and keep them in your organization.

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

IT Compliance Solutions

Enforce compliance consistently and cost-effectively across your organization.

Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.