Information Security Leader, Author, Instructor and Speaker

Default utility Image

What’s Next for Encryption Legislation? TAGS: | The legal battle between the FBI and Microsoft this spring brought encryption into the public spotlight in a major way …Continue reading →

Default utility Image

Encryption is Not Evil TAGS: | In the past few months, deadly terrorist attacks rocked both Paris, France and San Bernardino, California.  The technical investigation following …Continue reading →

Default utility Image

5 Security Must-Knows for Windows 10 TAGS: | | | Microsoft’s September release of the Windows 10 operating system caused a flurry of media activity centered around security and privacy …Continue reading →

Default utility Image

Get Ready for PCI DSS 3.1! TAGS: | | | Get ready, everyone – the next version of PCI DSS is on the books! If it seems like you’re hearing …Continue reading →

Default utility Image

Ransomware: Your Data Held Hostage TAGS: | | “Your personal files are encrypted!” glares the headline on a red pop-up window. The text that follows warns the user that …Continue reading →

Default utility Image

Hacking the Cloud TAGS: | | | Nude photos of well-known actresses certainly garner attention on their own, but this summer they drew attention to an unlikely …Continue reading →

Default utility Image

Exploring Encryption TAGS: | Encryption is one of the most powerful tools available to security professionals seeking to protect sensitive information from unauthorized disclosure. …Continue reading →

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Three steps to avoiding massive HIPAA violation fines TAGS: | | | Million-dollar penalties are drawing the attention of HIPAA-covered entities around the nation. To avoid running afoul of HIPAA regulations, there …Continue reading →

Default utility Image

Getting a Handle on Digital Certificates TAGS: | | It’s happened to all of us — at 4AM the phone rings and we find someone from operations on the …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple