Information Security Leader, Author, Instructor and Speaker

Default utility Image

Information Security Management: Making the Leap TAGS: | | | If you’re looking for a career path that allows you to exercise both leadership and technical skills, technology management may …Continue reading →

Default utility Image

5 Tips to Effectively Measure Security TAGS: Is your security program effective? Can you prove it in a way that senior IT and business leaders can understand? …Continue reading →

Default utility Image

Balancing Security and Productivity TAGS: | Security professionals around the world ask themselves the question Do I have the right level of control? on a daily …Continue reading →

Default utility Image

Aligning network security with business priorities TAGS: | Network security experts know that executives expect them to be familiar with firewall rulesets and capable of spotting potential network …Continue reading →

Default utility Image

Network access control technology: Over-hyped or under-used? TAGS: | | Over the past two years, network access control (NAC) technology has reached full-fledged buzzword status within the information security community. …Continue reading →

Default utility Image

Preparing for a network security audit starts with monitoring and remediation TAGS: | | There are a few people that come visiting once a year: some that we enjoy (Santa Claus and the Easter …Continue reading →

Default utility Image

Network security 2009 trends: Mergers, security budget cuts TAGS: | It’s always an interesting and worthwhile exercise to begin a new year by pausing and reflecting on the emerging security …Continue reading →

Default utility Image

Product review: Titus Labs’ Message Classification TAGS: | Classifying data is tedious and frustrating, but it’s impossible to develop appropriate security policies and standards, or efficient e-discovery processes, …Continue reading →

Default utility Image

Product review: Workshare Professional 5 TAGS: | Workshare Professional allows organizations to maintain control over information throughout the document lifecycle. It provides the ability to send documents …Continue reading →

Default utility Image

Google Desktop gets scarier TAGS: When Google Desktop first appeared on the computing scene, it was met with mixed reviews. This new tool offered what …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple