Information Security Leader, Author, Instructor and Speaker

Default utility Image

Defense Department Puts Bounty on Bugs TAGS: | | Cold hard cash is a strong motivator for many people and the Department of Defense is hoping that hackers are …Continue reading →

Default utility Image

Vulnerability Assessments Reveal Security Weaknesses TAGS: | How confident are you that your network is secure and that hackers aren’t lurking on a server, lying in wait …Continue reading →

Default utility Image

Choose the Best Vulnerability Assessment Tools TAGS: | Security vulnerabilities exist in every organization. The sheer volume of operating system, application and infrastructure security alerts announced each day …Continue reading →

Default utility Image

Getting Started with Automated Penetration Testing TAGS: | | | | The automated penetration test plays an important role in the security professional’s toolkit. As part of a comprehensive security program, …Continue reading →

Default utility Image

Building a Vulnerability Management Program TAGS: | How vulnerable are your IT systems to an electronic intrusion?  If you think you’re safe, what evidence do you have …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple