Type your search and hit enter

Stories by Joan Goodchild

Brand Protection: The Expanding CSO Portfolio

Pizza isn't typically a topic of conversation in company meetings at Caterpillar, the world's largest maker of construction and mining equipment, diesel and natural gas engines, and industrial gas turbines. But a recent unfortunate incident involving Domino's Pizza had a special team tasked with protecting Caterpillar's brand integrity taking notes and buzzing about how quickly a simple video can suddenly drag a massive corporate name through the mud.

Written by Joan Goodchild12 June 09 00:28

Social Engineering: The Fine Art of BS, Face to Face

Chris Nickerson is willing to push it about as far as a person can go when it comes to security assessments. The founder of Lares, a security consultancy in Colorado, Nickerson conducts what he calls "Red Team Assessments" for clients. He is paid to try and dupe a client, and the client's employees, to give them a clear picture of the weak spots in their security plan. He then advises them on how to shore up defenses more effectively in the event a real criminal comes knocking.

Written by Joan Goodchild08 June 09 23:06

Social Engineering: 5 Security Holes at the Office

If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

Written by Joan Goodchild10 June 09 23:11

Evolution of the CSO

It's been almost 15 years since David Kent first came to Genzyme, a biotech firm headquartered in Cambridge, Mass., that develops medical treatments for ailments such as certain genetic diseases and some forms of cancer. In 1994, the company had less than $200 million in sales, and only about 1,000 employees-a stark contrast to its worldwide workforce of 11,000 today and the $4.6 billion in revenue it reported in 2008.

Written by Joan Goodchild11 June 09 07:20

WhiteHat: Most Web sites are vulnerable now

The vast majority of web sites have a security vulnerability, according to data released Monday by WhiteHat Security, a security and audit provider specializing in web application security.

Written by Joan Goodchild19 May 09 02:03

Spammers work by US clocks and target Facebook, Twitter

While many working Americans are heading into the office and starting their day, spammers are busy, too, readying for their next onslaught of junk messages. According to a new report from Symantec, spammers favor the same work schedule as the typical American office worker.

Written by Joan Goodchild28 May 09 01:03

3 Tales of Systems Architecture Dilemmas

<em>There is an old saying that "a problem shared is a problem halved." In security, shared information can be elusive as risk professionals keep their cards close to their chest. But today's challenging business environment puts a premium on finding practical solutions to the tasks every CSO faces.</em>

Written by Joan Goodchild14 May 09 09:07

Report: Security Tops IT Budget Priorities

Security is on the minds of companies and many are still making room in their budgets to invest in IT security initiatives, according to a survey released Monday by Robert Half Technology.

Written by Joan Goodchild16 April 09 09:21

Four Telecommuting Security Mistakes

A look at some common security no-nos committed frequently by mobile workers, and tips on how to stop them.

Written by Joan Goodchild26 March 09 09:16

A Real Dumpster Dive: Bank Tosses Personal Data, Checks

In this new age of data protection, where most information is stored digitally and paper shredding is commonplace, you don't need to worry about private information ending up in the garbage, right? Steve Hunt shows that assumption is just plain wrong.

Written by Joan Goodchild19 March 09 10:22

5 ways to secure your Blackberry

What do Tom Cruise and the McCain campaign have in common? They have both been bitten by the loss of a Blackberry. Mobile expert Dan Hoffman gives advice on how to keep your cherished mobile device safe, even if it's out of your hands.

Written by Joan Goodchild18 Dec. 08 12:58

Why Cybercrime is Thriving

A new Symantec report reveals just how large and sophisticated the online underground economy has grown.

Written by Joan Goodchild27 Nov. 08 11:52