Information Security Leader, Author, Instructor and Speaker

Default utility Image

XDR: The Next Evolution in Endpoint Detection and Response? There’s a new security solution in town and it’s rapidly gaining traction. As with many security technologies that have come …Continue reading →

Default utility Image

4 Tips For Protecting Intellectual Property In Academia Around the world, academic researchers have turned their focus to combating the novel coronavirus. From medical schools to biology labs, …Continue reading →

Default utility Image

The Fundamentals of Zero-Trust Security for Schools When technology leaders encounter the term “zero trust” for the first time, they often find it off-putting. In a cybersecurity …Continue reading →

Default utility Image

5 Ways to Update An Agency’s Incident Response Plan Quick, find a copy of your agency’s cybersecurity incident response plan. Pull that binder off the shelf or call up …Continue reading →

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

The VPN Is Obsolete. Here’s What to Do Instead. The virtual private network has been a vital enabler of remote work for decades. But the technology, invented in 1996, …Continue reading →

Default utility Image

Secure Your VPN, No Matter What Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Default utility Image

How to Stop Phishing Attacks Most successful attacks begin with a simple message. Here is what every organization should know about eliminating email-based malware. How …Continue reading →

Default utility Image

Tech Tips for Colleges Using Zoom for Remote Learning Last summer, I had the opportunity to teach an undergraduate course in my university’s online summer program. I took a …Continue reading →

Default utility Image

3 Tips for Protecting a VPN in the Face of Major Vulnerabilities Last year, the Department of Homeland Security issued a vulnerability notice that disturbed many in the cybersecurity community: Several popular …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple