Information Security Leader, Author, Instructor and Speaker

Default utility Image

It’s Time to Question Longstanding Password Security Best Practices TAGS: | Nobody likes password policies. IT leaders dislike reminding users to yet again change their passwords, then bracing for an onslaught of angry …Continue reading →

Default utility Image

4 Ways Data Loss Prevention Tools Fit Right into Layered Security Strategies TAGS: | Cybersecurity pros often follow a defense-in-depth strategy, acknowledging the fact that controls will fail. Layered defenses are especially important in …Continue reading →

Default utility Image

Six Big Cybersecurity Certification Changes for 2018 TAGS: On the heels of one of the most significant years in cybersecurity history, organizations around the world are making plans to …Continue reading →

Default utility Image

2017 in Review: The Top Cybersecurity News Stories TAGS: | | | | | | 2017 was quite a year in the world of cybersecurity! From the politicization of cyberwarfare to several major data breaches, hardly …Continue reading →

Default utility Image

IDC PlanScape: Threat Hunting TAGS: | | “Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). …Continue reading →

Default utility Image

Data Science in Cybersecurity: Five Questions to Ask Vendors TAGS: “There’s a mad rush in the cybersecurity solutions space to use the terms machine learning, analytics, and data science in …Continue reading →

Default utility Image

Addressing the Cybersecurity Skills Gap TAGS: Cybersecurity professionals are used to managing crises, from the latest ransomware attack streaking across the Internet to a critical security vulnerability …Continue reading →

Default utility Image

IDC PlanScape: Creating a Cybersecurity Professional Development Program TAGS: | | “The world of cybersecurity is becoming increasingly siloed,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Leaders …Continue reading →

Default utility Image

Russia meddling mess will cost tech giants big bucks to fix TAGS: | During a series of hearings before House and Senate committees this week, members of Congress trotted out poster boards showing …Continue reading →

Default utility Image

IDC PlanScape: Building a Security Operations Center TAGS: | | “The security operations center serves as the nerve center of an organization’s cybersecurity program,” says Mike Chapple, adjunct analyst with …Continue reading →