Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Extracting value from data: How the cloud can help

Overcoming the challenges of machine learning at scale

Overcoming the challenges of machine learning at scale

Machine learning (ML) and artificial intelligence (AI) technologies are increasingly on the investment list for IT leaders. Among the many benefits of these technologies, building and deploying ML models can add automation to...

Do You Need a Tax Technologist for Your Organization?

As technology continues to evolve and impact the way companies do business, one division that is feeling these changes is the tax function. Tax leaders now need a sophisticated understanding of how technology impacts tax transactions,...

Today’s Essential Technologies Amid a New Tax Landscape

Sweeping changes are transforming the global tax environment. Longstanding tax rules no longer apply as tax overhauls in Europe and the US force businesses to adapt and comply with new policies. How tax leaders address these pivotal...

How to Make Data More Accessible at All Levels With Access Controls and Strong Governance

How to Make Data More Accessible at All Levels With Access Controls and Strong Governance

Supporting a Data-Driven Business Begins with Understanding Where Data Sits and Who Has Access

<em>South Dakota v. Wayfair</em> Ruling: Are You Ready to Comply?

The recent U.S. Supreme Court ruling in South Dakota v. Wayfair will dramatically change the landscape for online sellers when it comes to sales tax. Any business that sells goods remotely could be affected, which means some companies...

20 Security and Privacy Apps for Androids and iPhones

20 Security and Privacy Apps for Androids and iPhones

Encrypted storage, malware scanners, missing-phone-finders and more: Here are 20 apps to help protect your smartphone, your privacy and your data.

15 Social Media Scams

From Facebook phishing lures to Twitter and Tumblr hoaxes, here are 15 scams to watch out for on social networking sites.

15 Social Media Scams

15 Social Media Scams

From Facebook phishing lures to Twitter and Tumblr hoaxes, here are 15 scams to watch out for on social networking sites.

10 Infamous Hacks and Hackers

10 Infamous Hacks and Hackers

From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them).

10 Infamous Hacks and Hackers

From low-profile intrusions to statement-making break-ins, here are 10 headline-making system intrusions (and the culprits behind them).

Big-Screen Con Artists: 7 Great Movies About Social Engineering

Big-Screen Con Artists: 7 Great Movies About Social Engineering

They may have been called con artists, scoundrels or even matchstick men. Regardless of the name, social engineers have been the subject of several great movies over the years. Here are seven examples of films where social...

Load More