Information Security Leader, Author, Instructor and Speaker

Default utility Image

Defending Macs and iOS Devices Against Malware TAGS: | | “Apple devices don’t get malware.” Those words have echoed throughout technology organizations and, for years, they were generally true. Times have …Continue reading →

Default utility Image

Rootkits Unearthed TAGS: | “You’ve been infected with a rootkit.”  The chilling verdict is often delivered by cybersecurity experts on television drama series, but …Continue reading →

Default utility Image

Malware Jumps the Air Gap TAGS: | During the summer and fall of 2010, a quiet cyberwar erupted between Iran on one side and the United States …Continue reading →

Default utility Image

Drive-By Downloads TAGS: | You’ve installed antivirus software on your computer and are careful to avoid sketchy websites.  You should be safe from malware …Continue reading →

Default utility Image

Ransomware: Your Data Held Hostage TAGS: | | “Your personal files are encrypted!” glares the headline on a red pop-up window. The text that follows warns the user that …Continue reading →

Default utility Image

Malware Exposed TAGS: | Malware is perhaps the most dangerous threat to the security of the average computer system. Research by Microsoft recently estimated …Continue reading →

Default utility Image

Email Security: Defending the Enterprise TAGS: | | Entities seeking to secure their email environments should establish a comprehensive strategy designed to protect both the email infrastructure and …Continue reading →

Default utility Image

Five Ways To Secure Your Systems Against Hackers TAGS: | “Boss, I think that someone stole sensitive information from my system.” Those are words that no computer user ever wants …Continue reading →

Default utility Image

The Discipline of Malware Management TAGS: | Ask many IT professionals about the status of their malware management efforts and you’ll often hear responses like “Oh, we …Continue reading →

Default utility Image

Social engineering attack: How to remove rogue security software TAGS: | Security practitioners exhort users to install antivirus software and firewalls, and patch their systems. After hearing this for years, users …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple