Information Security Leader, Author, Instructor and Speaker

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Achieving a Best-in-Class Wireless Infrastructure TAGS: | Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that …Continue reading →

Default utility Image

Email Security: Defending the Enterprise TAGS: | | Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →

Default utility Image

Data Loss Prevention and the Financial Firm TAGS: | The financial industry runs on sensitive information.  From confidential customer information and payment card account numbers to sensitive financial analyses, …Continue reading →

Default utility Image

Principles of PCI Compliance TAGS: Credit and debit card information are among the most sensitive pieces of information that organizations must handle.  When they fall …Continue reading →

Default utility Image

Virtual Private Networks TAGS: The explosive growth of mobile computing technology has dramatically changed the security landscape for organizations of all shapes and sizes.  …Continue reading →

Default utility Image

Data Loss Prevention TAGS: | IT executives around the world know the sinking feeling that occurs when a security manager shows up in the doorway …Continue reading →

Default utility Image

PCI DSS Compliance TAGS: The Payment Card Industry Data Security Standard (PCI DSS) is a regulatory program created by the credit card industry to …Continue reading →

Default utility Image

Mobile Device Management TAGS: Walking the corridors of any organization these days reveals heads buried in all manner of smartphones and tablet PCs.  Whether …Continue reading →

Default utility Image

Two Factor Authentication Over the past decade, government agencies have seen greatly increased demand to share information with each other at the federal, …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple