Information Security Leader, Author, Instructor and Speaker

Default utility Image

3 Tips for Feds Looking to Ditch Old Datasets The digital universe is expanding at a staggering rate as government agencies, businesses and citizens generate troves of data each …Continue reading →

Default utility Image

Still got it: CISSP certification a must for aspiring security professionals Rumors of the Certified Information Systems Security Professional (CISSP) certification’s demise are greatly exaggerated. In January 2015, I published an …Continue reading →

Default utility Image

Managed security providers: What’s new? The managed security service provider market has grown recently, with providers adding both new customers and new services designed to …Continue reading →

Default utility Image

Connect to the red-hot hiring realm of network security with these top certs New network security threats arise on almost a daily basis, as users explore new ways of working and hackers develop …Continue reading →

Default utility Image

The science (and certification) of writing secure code The world runs on code. From online banking to electronic voting systems and from self-driving cars to medical devices, almost …Continue reading →

Default utility Image

HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: | The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many different …Continue reading →

Default utility Image

Closing the Cybersecurity Generation Gap TAGS: | | | Businesses around the world find their workforces increasingly divided along generational lines.  As the Boomer generation nears retirement, they find …Continue reading →

Default utility Image

Six Most In-Demand New Cybersecurity Certifications TAGS: | Cybersecurity is one of the hottest fields in information technology and skilled cybersecurity professionals are in high demand. Threats to enterprise …Continue reading →

Default utility Image

10 Things Your Business Manager Wishes You Knew TAGS: | Partnerships between technology managers and business managers are critical to the success of higher education IT organizations. The expertise in …Continue reading →

Default utility Image

App container, app wrapping and other emerging mobile security tactics TAGS: | | The flood of personal devices entering organizations through both formal bring your own device programs and informal use of personal …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple