Information Security Leader, Author, Instructor and Speaker

Default utility Image

Next Generation Firewalls: The New Norm in Defense TAGS: | | Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part …Continue reading →

Default utility Image

Network Security: Get Certified! TAGS: | Network security professionals with proven skills can almost write their own job description. A shortage of networking professionals combined with …Continue reading →

Default utility Image

WAFs, SDLC and PCI Compliance TAGS: | | Web applications remain one of the most vulnerable parts of our computing infrastructure.  We’ve taken extraordinary measures over the past …Continue reading →

Default utility Image

Managing Network Firewalls: Taming the Beast TAGS: | Network firewalls are one of the mainstay security controls that organizations around the world rely upon to protect our networks …Continue reading →

Default utility Image

Building a Secure Wireless Network TAGS: | TJX, the parent company of Marshalls, T.J. Maxx and other retailers,lost 45 million credit card numbers several years ago because …Continue reading →

NetFlow Security Monitoring for Dummies TAGS: This book takes you through the basics of NetFlow analysis for information security purposes, including details on what NetFlow is, …Continue reading →

Default utility Image

Stuxnet and the Advanced Persistent Threat TAGS: | | The Michiana chapter of the Institute of Internal Auditors invited me to give a talk today for their CPE program …Continue reading →

Default utility Image

Introduction to SNMPv3’s security functionality TAGS: While SNMP is well established, inherent security gaps were only closed in the latest version of the network protocol. If …Continue reading →

Default utility Image

UTM features: Is a UTM device right for your layered defense? TAGS: | For several years, industry insiders have lauded the widespread availability of unified threat management (UTM) systems as the tipping point …Continue reading →

Default utility Image

Manage Your Firewall Rulebase Closely TAGS: | Does your firewall rulebase remind you of that drawer in your kitchen where you throw all sorts of miscellaneous junk …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple