Information Security Leader, Author, Instructor and Speaker

Default utility Image

Rule 41: What does it mean for enterprises? TAGS: | The Federal Rules of Criminal Procedure (FRCP) govern the criminal trials that take place in all federal courts around the …Continue reading →

Default utility Image

Information Security Management: Making the Leap TAGS: | | | If you’re looking for a career path that allows you to exercise both leadership and technical skills, technology management may …Continue reading →

Default utility Image

What’s Next for Encryption Legislation? TAGS: | The legal battle between the FBI and Microsoft this spring brought encryption into the public spotlight in a major way …Continue reading →

Default utility Image

Securing the Internet of Things TAGS: Browse the shelves of your local home improvement or appliance store and you likely won’t be able to move two …Continue reading →

Default utility Image

PCI DSS 3.2: Is this really the end? TAGS: Has the era of major revisions to the Payment Card Industry Data Security Standard (PCI DSS) come to an end?  …Continue reading →

Default utility Image

Defense Department Puts Bounty on Bugs TAGS: | | Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →

Default utility Image

Defending Macs and iOS Devices Against Malware TAGS: | | “Apple devices don’t get malware.” Those words have echoed throughout technology organizations and, for years, they were generally true. Times have …Continue reading →

Default utility Image

Secure Cloud: Earning Your Cloud Security Certification TAGS: | | | Cloud computing is transforming the world of information technology before our eyes. Less than a decade ago, IT teams focused most …Continue reading →

Default utility Image

Encryption is Not Evil TAGS: | In the past few months, deadly terrorist attacks rocked both Paris, France and San Bernardino, California.  The technical investigation following …Continue reading →

Default utility Image

IT and End of Life Issues TAGS: | | Organizations around the world have extremely complex technology environments that depend upon many different components to function properly. Operating systems, …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple