Information Security Leader, Author, Instructor and Speaker

Default utility Image

Nine pitfalls to avoid on your path to certification Over the past two decades, I’ve helped thousands of people earn cybersecurity certifications through my books, video courses, and online …Continue reading →

Default utility Image

Evaluating Intrusion Prevention Systems in Higher Education Colleges and universities continue to find themselves the targets of large-scale cyberattacks. Some of these come from foreign sources, such …Continue reading →

Default utility Image

How Government Can Leverage CASBs and Improve Cloud Visibility Agencies may already have tools in place to track the presence of sensitive information within internal systems, but the process …Continue reading →

Default utility Image

A rebooted CCSP certification exam is coming In just a few short months, the Certified Cloud Security Professional (CCSP) certification offered by IT security professional association (ISC)² …Continue reading →

Default utility Image

5 Tips for Updating a Cybersecurity Incident Response Plan TAGS: | Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →

Default utility Image

Cloud Access Security Brokers Give IT Staff Visibility and Oversight TAGS: Colleges and universities are rapidly expanding their use of cloud services, ranging from complete infrastructure deployments to specialized applications. This leaves cybersecurity …Continue reading →

Default utility Image

5 Steps to Integrate a Business’ Security Solutions TAGS: Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →

Default utility Image

4 Ways to Keep Sensitive Data from Escaping to the Public Cloud TAGS: | Think about how many cloud services you use every day. Chances are that it’s a mixture of services managed by your employer and others …Continue reading →

Default utility Image

How to Choose Between Penetration Tests and Vulnerability Scans  TAGS: | Even seasoned cybersecurity professionals confuse penetration tests with vulnerability scans. Both play an important role in the security practitioner’s toolkit, but …Continue reading →

Default utility Image

Why You Should Conduct Risk Assessments Before Buying New Cybersecurity Products TAGS: The worldwide market for cybersecurity products and services will surpass $95 billion this year, according to Gartner. That’s a staggering …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple