Information Security Leader, Author, Instructor and Speaker

Default utility Image

Three steps to avoiding massive HIPAA violation fines TAGS: | | | Million-dollar penalties are drawing the attention of HIPAA-covered entities around the nation. To avoid running afoul of HIPAA regulations, there …Continue reading →

Default utility Image

Managed mobility services: Benefits of MDM in the cloud TAGS: Unfortunately, the mobile device management (MDM) market is a mess. Any enterprise that has recently conducted a market assessment has …Continue reading →

Default utility Image

Endpoint Security for BYOD TAGS: | From iPhones and Android devices to tablets and notebooks, employees are increasingly bringing devices from home to the office for …Continue reading →

Default utility Image

Mobile Platform Security TAGS: Chances are that the vast majority of employees walking around your building are unknowingly carrying security threats around in their …Continue reading →

Default utility Image

Keep Those Notebooks Safe With Encryption TAGS: | Every year, thousands of notebook computers go missing around the country. The security administrators responsible for the safety of those …Continue reading →

Default utility Image

Network Access Considerations for Tablets TAGS: | Should we allow tablet computers on our corporate network? Over the next year, organizations that haven’t already answered this question …Continue reading →

Default utility Image

Network Access Control: Handling Smartphones TAGS: | From iPhone, to Droid, to BlackBerry, to Nexus One, it seems a new mobile device is born every week and …Continue reading →

Default utility Image

Don’t Be Afraid of that Coffee Shop Connection TAGS: | Right now, someone from your organization is sitting in a coffee shop, airport or hotel, taking advantage of a shared …Continue reading →

Default utility Image

Securing employee smartphones: iPhone security settings, deployments TAGS: | Until recently, the iPhone was viewed more as a novelty that appealed to end users than as a serious business …Continue reading →

Default utility Image

Bringing Security to Smartphones TAGS: | Where is your sensitive business data right now? Chances are a good portion of it is on the road or …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple