Information Security Leader, Author, Instructor and Speaker

Default utility Image

The 5 Cybersecurity Must-Haves for Every Business Walking the exhibition hall at a modern cybersecurity trade show can be a dizzying experience. Vendors from every angle tout …Continue reading →

Default utility Image

Adapt These Settings for a Faster Windows 10 When Microsoft launched Windows 10 in 2015, the company set a goal of hitting 1 billion installed devices within three …Continue reading →

Default utility Image

Plan Well for a Hybrid Cloud Environment and See Efficiencies Early on, cloud computing promised to simplify enterprise computing, transferring mundane work to service providers. But agencies that have not …Continue reading →

Default utility Image

Lessons Learned from Six Major Data Breaches “Every security breach that we read about in the news provides us with an opportunity to reflect upon the root …Continue reading →

Default utility Image

Security, Privacy and Confidentiality: What’s the Difference? Campus administrators and faculty understand the importance of protecting sensitive student information. The past two decades have brought us a variety …Continue reading →

Default utility Image

Don’t Be Victimized by a Supply Chain Attack Six years ago, a major U.S. retailer suffered one of the most famous data breaches in history. Attackers compromised the …Continue reading →

Default utility Image

Understanding FERPA: How K–12 Schools Can Update Their Data Privacy Approach Administrators and educational staff at schools around the country understand the importance of protecting student privacy. The Family Educational Rights …Continue reading →

Default utility Image

Is certification a reliable means of learning new IT skills and concepts? Earning a technology certification requires some significant investments of both money and time. Candidates purchase study materials, pay tuition for …Continue reading →

Default utility Image

Fact or Fallacy: Stay Up to Date on the Best Practices for Password Security How much do you know about passwords? You might believe password authentication is old hat, and that you already know …Continue reading →

Default utility Image

5 Questions to Ask About Buying AI-Enabled Security Software Security products incorporating artificial intelligence techniques may reduce the workload for human analysts,taking over the time-consuming job of correlating information sources and mining …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple