Information Security Leader, Author, Instructor and Speaker

Default utility Image

HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: | The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many different …Continue reading →

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

Six Most In-Demand New Cybersecurity Certifications TAGS: | Cybersecurity is one of the hottest fields in information technology and skilled cybersecurity professionals are in high demand. Threats to enterprise …Continue reading →

Default utility Image

10 Things Your Business Manager Wishes You Knew TAGS: | Partnerships between technology managers and business managers are critical to the success of higher education IT organizations. The expertise in …Continue reading →

Default utility Image

App container, app wrapping and other emerging mobile security tactics TAGS: | | The flood of personal devices entering organizations through both formal bring your own device programs and informal use of personal …Continue reading →

Default utility Image

Rule 41: What does it mean for enterprises? TAGS: | The Federal Rules of Criminal Procedure (FRCP) govern the criminal trials that take place in all federal courts around the …Continue reading →

Default utility Image

Information Security Management: Making the Leap TAGS: | | | If you’re looking for a career path that allows you to exercise both leadership and technical skills, technology management may …Continue reading →

Default utility Image

What’s Next for Encryption Legislation? TAGS: | The legal battle between the FBI and Microsoft this spring brought encryption into the public spotlight in a major way …Continue reading →

Default utility Image

Securing the Internet of Things TAGS: Browse the shelves of your local home improvement or appliance store and you likely won’t be able to move two …Continue reading →

Default utility Image

PCI DSS 3.2: Is this really the end? TAGS: Has the era of major revisions to the Payment Card Industry Data Security Standard (PCI DSS) come to an end?  …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple