Information Security Leader, Author, Instructor and Speaker

Default utility Image

The Great Firewall of China TAGS: | Visitors from around the world flock to China to view one of the world’s architectural marvels: the Great Wall of …Continue reading →

Default utility Image

Integrated Security: Symantec Gateway Security 5600 Series TAGS: | | Symantec’s Gateway Security 5600 series integrated security appliance is an ideal solution for enterprises restricted by the expense and resource …Continue reading →

Default utility Image

Manage Your Firewall Rulebase Closely TAGS: | Does your firewall rulebase remind you of that drawer in your kitchen where you throw all sorts of miscellaneous junk …Continue reading →

Default utility Image

Enterprise UTM security: The best threat management solution? TAGS: | | If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information …Continue reading →

Default utility Image

Evaluating MSSP security before taking the plunge TAGS: | | As the economy continues to tumble and organizations of all kinds seek ways to reduce costs, the promise of security …Continue reading →

Default utility Image

An Analysis of Firewall Rulebase (mis)Management Practices TAGS: Firewalls are complex security devices that protect information assets from external attack. Natural aging of their rulebases and administrator error …Continue reading →

Default utility Image

Firewall Architecture Tutorial TAGS: | Many network administrators have considered implementing dual firewalls. It is an expensive option, and the administrator who proposes the idea …Continue reading →

Default utility Image

Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls TAGS: | When developing a perimeter protection strategy for an organization, one of the most common questions is “Where should I place …Continue reading →

Default utility Image

Auditing Firewall Activity TAGS: | In the first three parts of this series, we explored choosing a firewall platform, choosing an appropriate topology, and placing …Continue reading →

Default utility Image

Bringing the network perimeter back from the dead TAGS: | | With apologies to Samuel Clemens, the rumors of the perimeter’s death have been greatly exaggerated. I recently attended a conference …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple