Information Security Leader, Author, Instructor and Speaker

Default utility Image

Defense Department Puts Bounty on Bugs TAGS: | | Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →

Default utility Image

Defending Macs and iOS Devices Against Malware TAGS: | | “Apple devices don’t get malware.” Those words have echoed throughout technology organizations and, for years, they were generally true. Times have …Continue reading →

Default utility Image

Secure Cloud: Earning Your Cloud Security Certification TAGS: | | | Cloud computing is transforming the world of information technology before our eyes. Less than a decade ago, IT teams focused most …Continue reading →

Default utility Image

Encryption is Not Evil TAGS: | In the past few months, deadly terrorist attacks rocked both Paris, France and San Bernardino, California.  The technical investigation following …Continue reading →

Default utility Image

IT and End of Life Issues TAGS: | | Organizations around the world have extremely complex technology environments that depend upon many different components to function properly. Operating systems, …Continue reading →

Default utility Image

Preserving Data Integrity TAGS: | | | In 2014, officials at the Internal Revenue Service received a Congressional subpoena demanding that the agency turn over all email …Continue reading →

Default utility Image

Minimizing Compliance Costs with GDPR on the Horizon TAGS: | The proposed General Data Protection Regulation (GDPR) recently passed a key legislative hurdle in the European Union and enterprise compliance …Continue reading →

Default utility Image

Hollywood vs. Reality: Cybersecurity Fact Check TAGS: “I’ll just synchronize these firewall settings and bypass the encryption and we’ll be inside the system in a few seconds.” …Continue reading →

Default utility Image

The Trans-Pacific Partnership and Cybersecurity TAGS: | The Trans-Pacific Partnership agreement has come under fire from a wide variety of opponents, including Internet activists and online privacy …Continue reading →

Default utility Image

CISA regulation: What enterprises need to know TAGS: In October, the U.S. Senate passed the Cybersecurity Information Sharing Act (CISA) by an overwhelming majority and CISA appears to …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple