Information Security Leader, Author, Instructor and Speaker

Default utility Image

Troubleshooting proxy firewall connections TAGS: | With more proxy firewalls being placed between clients and servers, troubleshooting connectivity issues has become more complicated than in the …Continue reading →

Default utility Image

Building application firewall rulebases TAGS: | During the past decade, most enterprises have made significant investments in network and perimeter security. Organizations have tightened their controls …Continue reading →

Default utility Image

How to choose a firewall TAGS: | There are several different types of firewalls on the market today. Choosing one for your organization can be a daunting …Continue reading →

Default utility Image

Choosing the right firewall topology: Bastion host, screened subnet or dual firewalls TAGS: | When developing a perimeter protection strategy for an organization, one of the most common questions is “Where should I place …Continue reading →

Default utility Image

Placing systems in a firewall topology TAGS: | In the previous tip we explored the basics of choosing a firewall topology. We covered the differences between bastion hosts, …Continue reading →

Default utility Image

Bridging the gap between perimeter and host security TAGS: | Most organizations recognize the importance of information security and devote resources to an information security program with adequate technical controls. …Continue reading →

Default utility Image

Protecting the network from Web-based service attacks with defense-in-depth TAGS: | | Defending a network perimeter against Web-based service attacks has become increasingly complex over the past several years. New threats flood …Continue reading →

Default utility Image

Securing your home network for $100 or less TAGS: Modern organizations often invest thousands of dollars in maintaining the security of their computing networks. You can walk into almost …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple