Information Security Leader, Author, Instructor and Speaker

Default utility Image

Five Ways To Secure Your Systems Against Hackers TAGS: | “Boss, I think that someone stole sensitive information from my system.” Those are words that no computer user ever wants …Continue reading →

Default utility Image

Windows 7 Network Security TAGS: | While Windows XP remains the world’s most widely used client computer operating system, experts project that Windows 7 adoption will …Continue reading →

Default utility Image

Endpoint Security for BYOD TAGS: | From iPhones and Android devices to tablets and notebooks, employees are increasingly bringing devices from home to the office for …Continue reading →

Default utility Image

Windows vs. Mac Security: An Enterprise Endpoint Security Comparison TAGS: | | Everywhere we look we see reports and hear anecdotes that the Macintosh invasion of the enterprise is underway. Indeed, when …Continue reading →

Default utility Image

Podcast: Endpoint encryption strategies TAGS: | When a laptop turns up stolen, it’s reassuring to know that the contents of the device were encrypted, transforming a …Continue reading →

Default utility Image

Product review: Promisec’s Spectator TAGS: | The endpoint security is today’s hot button information security issue, and the marketplace is flooded with solutions ranging from costly …Continue reading →

Default utility Image

Hot Pick: SecureWave’s Sanctuary Device Control 3.0.1 TAGS: | It’s your company’s equipment and your company’s intellectual property. If you don’t want employees treating either as if it were …Continue reading →

Default utility Image

Bridging the gap between perimeter and host security TAGS: | Most organizations recognize the importance of information security and devote resources to an information security program with adequate technical controls. …Continue reading →

Default utility Image

Desktop Security: GreenBorder Enterprise Security TAGS: | | Enterprise Security Solution doesn’t detect anything; it protects Internet Explorer and Outlook users from themselves through a sandboxing technique that …Continue reading →

Default utility Image

XP SP2’s effect on your Web site TAGS: | Last month’s XP SP2 rollout was one of the highest-profile software releases yet. Unlike previous service packs and hotfixes, SP2 …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple