Information Security Leader, Author, Instructor and Speaker

Default utility Image

Removing rootkits from your organization TAGS: | The word rootkit strikes fear in the hearts of most security professionals. These specially crafted pieces of malicious code are …Continue reading →

Default utility Image

Locating keyloggers TAGS: | Keyloggers are one of the threats that keep security professionals awake at night. By monitoring user activity and disclosing keystrokes …Continue reading →

Default utility Image

File format vulnerabilities: protecting your application TAGS: File format vulnerabilities are quickly taking center stage as one of the primary information security threats facing modern enterprises. Attackers …Continue reading →

Default utility Image

Podcast: Ransomware — How to deal with advanced encryption algorithms TAGS: | It’s late in the day, and your CEO reports a strange message on his computer screen: his files have been …Continue reading →

Default utility Image

Podcast: Stopping malware in its tracks TAGS: In honor of April Fools’ Day, Mike Chapple continues a month-long series that highlights the industry’s most common mistakes. One …Continue reading →

Default utility Image

ESET NOD32 Antivirus TAGS: | | NOD32 allows administrators to apply policy to individual systems or groups of systems through the remote administrator feature. Policy control …Continue reading →

Default utility Image

RSS: The next malware target? TAGS: | Those of us who have been around the information security profession for a while have come to recognize a familiar …Continue reading →

Default utility Image

Protecting Your Network from Security Risks and Threats TAGS: | The second your network connects to the greater world of the internet, you expose yourself to attack. For a large …Continue reading →

Default utility Image

Blocking IM applications in the enterprise TAGS: | Instant Messaging (IM) applications are a staple of modern communication. If you’re not using AIM, Yahoo! Messenger or a similar …Continue reading →

Default utility Image

Antispyware: Blue Coat Systems’ Spyware Interceptor SI-1 TAGS: | | Interceptor SI-1 is one of the first products to approach spyware from a network-based perspective, protecting devices behind the gateway–a …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple