Information Security Leader, Author, Instructor and Speaker

Default utility Image

Fact or Fallacy: Stay Up to Date on the Best Practices for Password Security How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →

Default utility Image

5 Questions to Ask About Buying AI-Enabled Security Software Security products incorporating artificial intelligence techniques may reduce the workload for human analysts,taking over the time-consuming job of correlating information sources and mining …Continue reading →

Default utility Image

Six Niche Security Certifications Sometimes you have to step off the beaten path to find the right certification. Let’s take a look at the …Continue reading →

Default utility Image

SIEM vs SOAR: What?s the Difference, and Do Businesses Need Both? The cybersecurity world is full of acronyms; it’s difficult to go an entire year without vendors beating down the door …Continue reading →

Default utility Image

IDC PlanScape: Building an Analytics Center of Excellence “Analytics centers of excellence serve as the nucleus of an organization’s data transformation efforts,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

Taking Social Security numbers public could fix our data breach crisis Earlier this week, we learned that the American Medical Collection Agency, a billing collection agency, suffered a data breach affecting millions …Continue reading →

Default utility Image

Fact or Fallacy: Stay Up to Date on Best Practices for Password Security How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →

Default utility Image

Becoming a data security administrator is a great pathway into cybersecurity In a recent survey of Chief Information Officers, 88 percent reported that cybersecurity initiatives were on their shortlist of priorities for …Continue reading →

Default utility Image

Password-Based Attacks Pose New Dangers for Agency Networks Last year, the United States Computer Emergency Readiness Team (US-CERT) issued an alert that hackers were targeting organizations in the …Continue reading →

Default utility Image

Big Tech can’t be trusted. It’s time for regulation Big Tech is under the spotlight, and for good reason. In the past couple of years, an onslaught of incidents …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple