Information Security Leader, Author, Instructor and Speaker

Default utility Image

Big Tech can’t be trusted. It’s time for regulation Big Tech is under the spotlight, and for good reason. In the past couple of years, an onslaught of incidents …Continue reading →

Default utility Image

Does Your Business Need Unified Endpoint Management? Consider how many endpoint device types exist in the typical business: Virtually all have desktop and laptop computers, as well …Continue reading →

Default utility Image

5 Ways to Safeguard Student Information Schools handle a wide variety of sensitive information concerning students and their families. Laws, regulations and ethical obligations require administrators …Continue reading →

Default utility Image

Nine pitfalls to avoid on your path to certification Over the past two decades, I’ve helped thousands of people earn cybersecurity certifications through my books, video courses, and online …Continue reading →

Default utility Image

Evaluating Intrusion Prevention Systems in Higher Education Colleges and universities continue to find themselves the targets of large-scale cyberattacks. Some of these come from foreign sources, such …Continue reading →

Default utility Image

How Government Can Leverage CASBs and Improve Cloud Visibility Agencies may already have tools in place to track the presence of sensitive information within internal systems, but the process …Continue reading →

Default utility Image

A rebooted CCSP certification exam is coming In just a few short months, the Certified Cloud Security Professional (CCSP) certification offered by IT security professional association (ISC)² …Continue reading →

Default utility Image

5 Tips for Updating a Cybersecurity Incident Response Plan TAGS: | Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →

Default utility Image

Cloud Access Security Brokers Give IT Staff Visibility and Oversight TAGS: Colleges and universities are rapidly expanding their use of cloud services, ranging from complete infrastructure deployments to specialized applications. This leaves cybersecurity …Continue reading →

Default utility Image

5 Steps to Integrate a Business’ Security Solutions TAGS: Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple