Joan Goodchild

Contributor

Joan Goodchild is a veteran writer and editor with 20+ years experience. She covers business technology and information security and is the former editor in chief of CSO. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

Extracting value from data: How the cloud can help

Overcoming the challenges of machine learning at scale

Overcoming the challenges of machine learning at scale

Machine learning (ML) and artificial intelligence (AI) technologies are increasingly on the investment list for IT leaders. Among the many benefits of these technologies, building and deploying ML models can add automation to...

Do You Need a Tax Technologist for Your Organization?

As technology continues to evolve and impact the way companies do business, one division that is feeling these changes is the tax function. Tax leaders now need a sophisticated understanding of how technology impacts tax transactions,...

Today’s Essential Technologies Amid a New Tax Landscape

Sweeping changes are transforming the global tax environment. Longstanding tax rules no longer apply as tax overhauls in Europe and the US force businesses to adapt and comply with new policies. How tax leaders address these pivotal...

How to Make Data More Accessible at All Levels With Access Controls and Strong Governance

How to Make Data More Accessible at All Levels With Access Controls and Strong Governance

Supporting a Data-Driven Business Begins with Understanding Where Data Sits and Who Has Access

<em>South Dakota v. Wayfair</em> Ruling: Are You Ready to Comply?

The recent U.S. Supreme Court ruling in South Dakota v. Wayfair will dramatically change the landscape for online sellers when it comes to sales tax. Any business that sells goods remotely could be affected, which means some companies...

CSO50 winners remain a step ahead

CSO50 winners remain a step ahead

Check out the 50 winners to be lauded at CSO's annual award ceremony. This year’s winners are designing security to stay in front of modern threats.

Why the CSO needs to be involved in active shooter prep

All security managers, especially those charged with physical security responsibilities, need to be involved in emergency prep for varying scenarios - including the potential for an active shooter on scene. Imad Mouline, CTO at...

Professional hackers talk social engineering threats and security awareness

Professional hackers talk social engineering threats and security awareness

With years of experience pen testing and human hacking, Chris Hadnagy and Dave Kennedy are experts at how social engineers work, and what techniques they use to successfully breach an organization. In this discussion with CSO Chief...

Why I Did It: Former Hacker Mitchell Frost Explains His Motivation

In 2006, Mitchell Frost, then a 19-year-old college student at the University of Akron, used the school's computer network to control the botnets he had created.

How Keylogging Malware Steals Your Information

George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data.

Mobile Security: How Gadgets Evolved

Mobile Security: How Gadgets Evolved

Still got an old BlackBerry or Compaq laying around? Here's a look at how mobile device security has evolved.

Load More