Joan GoodchildEditor, Online, CSO Follow me on Google+

Joan Goodchild is responsible for editorial strategy and writes frequently about security leadership, social engineering, social media security and cybercrime in her role as Editor of CSO. Her previous experience in business journalism includes roles as broadcast and web editor with the Boston Business Journal and as a news writer covering the Windows OS with TechTarget. Prior to that, she worked as a television reporter and anchor for more than a decade. Joan has a Master's degree in journalism from Northwestern University's Medill School of Journalism.

Questions to Ask About Tablet Security

Some companies are adopting them and many employees are dying to use them. But are tablets too risky for the enterprise?

Want to Stop Junk Email? Block Payments to Spammers

Stopping spam is an almost futile effort if the focus continues to be on spam filtering and botnet takedown, according to a research team.

Bin Laden Death Shouldn't Impact Travel Plans, Experts Say

Despite stepped up police presence and a U.S State Department advisory warning, here's why experts say there's little need to cancel business travel plans.

The Children's Place Hit with Database Breach

The children's clothing retailer says someone accessed its e-mail database and sent out a phishing message in an attempt to gather credit card information.

Five Tips to Avoid Getting Phished

Avoid phishing scams with these tips.

7 Communication Mistakes CSOs Still Make

For many years, we heard security professionals lament the way they are perceived. Terms such as "the place where good ideas go to die" and "the department of no" weren't uncommon just a few years ago when referring to the security function.

VoIP Abuse Will Grow: Three Simple Reasons Why

In its recent annual security report, Cisco predicted VOIP abuse as a potential area for cyber crime growth.

Botnets: Size Isn't Everything

Published figures estimating the size and scope of botnets are often inaccurate and do not reflect the threat these compromised networks pose to security.

Security Manager: Malware Has 'Exploded'

A report released earlier this year by Panda Security reveals just how sophisticated the business of cyber crime has become.

Why Trustworthy Sites Can No Longer Be Trusted

Cybercriminals are hacking trusted sites using stolen access credentials in order to launch attacks that are out in the open, but also veiled from reputation filters and commonly blocked web categories. Here are three reasons researchers say you need to be wary -- even on sites you count as safe

Social Engineering: 3 Examples of Human Hacking

Chris Hadnagy gets paid to fool people, and he's gotten pretty good at it over the years. A co-founder of social-engineering.org and author of Social Engineering: The Art of Human Hacking, Hadnagy has been using manipulation tactics for more than a decade to show clients how criminals get inside information.

New Facebook Vulnerability Patched

Facebook has quietly fixed a vulnerability discovered recently by two student researchers that allowed malicious websites to access a Facebook user's private data without permission and post malicious links onto their profile.

4 Tips for Facebook From Security and Privacy Experts

'Get the dislike button!' 'OMG this girl KILLED herself after her dad posted on her wall!' What do these comments have in common? They are two of the scams we see making the rounds on Facebook in an attempt to get you to click on and install a bad application.

Facebook Halts Controversial Sharing Feature -- for Now

Facebook said Monday it will temporarily disable a controversial feature that allows application developers and third-party web sites to access users' phone numbers and addresses

Rustock Awakens, Spam Volume Back up

After a brief period of low spam levels, top-dog spam botnet Rustock appears to be back in business