Information Security Leader, Author, Instructor and Speaker

Default utility Image

Aligning network security with business priorities TAGS: | Network security experts know that executives expect them to be familiar with firewall rulesets and capable of spotting potential network …Continue reading →

Default utility Image

Network access control technology: Over-hyped or under-used? TAGS: | | Over the past two years, network access control (NAC) technology has reached full-fledged buzzword status within the information security community. …Continue reading →

Default utility Image

Evaluating MSSP security before taking the plunge TAGS: | | As the economy continues to tumble and organizations of all kinds seek ways to reduce costs, the promise of security …Continue reading →

Default utility Image

Podcast: Making NAC work with your existing security tools TAGS: | This podcast provides listeners with real-world anecdotes and detailed information on how to overcome obstacles presented by conflicts between your …Continue reading →

Default utility Image

Preparing for a network security audit starts with monitoring and remediation TAGS: | | There are a few people that come visiting once a year: some that we enjoy (Santa Claus and the Easter …Continue reading →

Default utility Image

Microsoft NAP/TNC alliance brings new dimension to network access control decisions TAGS: | | Network access control (NAC) systems provide information security teams with a valuable weapon in the endpoint security war. This is …Continue reading →

Default utility Image

Nessus and other vulnerability scanning options TAGS: | A recent analysis by SPI Dynamics revealed that approximately a quarter of patches released by Microsoft during the past two …Continue reading →

Default utility Image

Network security 2009 trends: Mergers, security budget cuts TAGS: | It’s always an interesting and worthwhile exercise to begin a new year by pausing and reflecting on the emerging security …Continue reading →

Default utility Image

Writing Wireshark network traffic filters TAGS: Wireshark is a powerful, free tool that examines network packets and allows analysts to peer inside traffic for troubleshooting Read …Continue reading →

Default utility Image

Wireshark tutorial: How to sniff network traffic TAGS: In this tutorial, Wireshark whiz Mike Chapple explains how to use the tool to capture network traffic and how to …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple