Information Security Leader, Author, Instructor and Speaker

Default utility Image

Securing Mobile Devices with Containers TAGS: | | Chances are that right now, there are hundreds or thousands of individuals around the world carrying mobile devices that hold …Continue reading →

Default utility Image

E-Mail Encryption Made Easy TAGS: | Preserving the confidentiality of electronic mail messages is one of the most vexing issues facing security professionals today.  This is …Continue reading →

Default utility Image

Securing Your Website with Digital Certificates TAGS: | | Website users are trained to recognize the signs and symbols of a secure website — from the HTTPS in the …Continue reading →

Default utility Image

VoIP eavesdropping: Hardening network security to contain VoIP risks TAGS: | Every organization considering a Voice over Internet Protocol (VoIP) telephone system deployment hears the same dire warnings: “Routing voice calls …Continue reading →

Default utility Image

P2P encryption: Pros and cons of point-to-point encryption TAGS: | There’s been a lot of buzz in security circles recently about point-to-point encryption (P2PE) technology and the potential it has …Continue reading →

Default utility Image

Keep Those Notebooks Safe With Encryption TAGS: | Every year, thousands of notebook computers go missing around the country. The security administrators responsible for the safety of those …Continue reading →

Default utility Image

Point to Point Encryption and PCI Compliance TAGS: | Many vendors are touting point-to-point encryption as a solution to limit the DSS (Payment Card Industry Standard), a regulation affecting …Continue reading →

Default utility Image

Encryption 101: Keys, Algorithms and You TAGS: In today’s world, understanding at a minimum basic level how to protect data you’re both storing and transmitting is essential …Continue reading →

Default utility Image

Encryption Demystified TAGS: | Just hearing the word “encryption” can bring shudders to technology professionals, many of whom find themselves intimidated by this seemingly …Continue reading →

Default utility Image

Laptop full disk encryption: debunking the myths TAGS: | | Full disk encryption (FDE) is widely used to control the risk of users travelling with (and losing) portable computers containing …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple