Information Security Leader, Author, Instructor and Speaker

Default utility Image

IDC PlanScape: Building Compliant Cloud Environments TAGS: | “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

DHS’s CDM Program Moves to the Next Phase: Protection TAGS: From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal …Continue reading →

Default utility Image

IDC PlanScape: Deploying Multifactor Authentication TAGS: “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →

Default utility Image

HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: | The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many different …Continue reading →

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

Hacking Small Companies is Big Business Information security often takes a backseat to other issues that small business owners face. With more immediate concerns, such as …Continue reading →

Default utility Image

Six Most In-Demand New Cybersecurity Certifications TAGS: | Cybersecurity is one of the hottest fields in information technology and skilled cybersecurity professionals are in high demand. Threats to enterprise …Continue reading →

Default utility Image

10 Things Your Business Manager Wishes You Knew TAGS: | Partnerships between technology managers and business managers are critical to the success of higher education IT organizations. The expertise in …Continue reading →

Default utility Image

App container, app wrapping and other emerging mobile security tactics TAGS: | | The flood of personal devices entering organizations through both formal bring your own device programs and informal use of personal …Continue reading →