Information Security Leader, Author, Instructor and Speaker

Default utility Image

IT and End of Life Issues TAGS: | | Organizations around the world have extremely complex technology environments that depend upon many different components to function properly. Operating systems, …Continue reading →

Default utility Image

Vulnerability Assessments Reveal Security Weaknesses TAGS: | How confident are you that your network is secure and that hackers aren’t lurking on a server, lying in wait …Continue reading →

Default utility Image

Choose the Best Vulnerability Assessment Tools TAGS: | Security vulnerabilities exist in every organization. The sheer volume of operating system, application and infrastructure security alerts announced each day …Continue reading →

Default utility Image

Tech Tips: Running a Vulnerability Scan TAGS: Vulnerability scanning plays a critical role in the information security program of any educational institution. Conducting regular security scans ensures …Continue reading →

Default utility Image

Five Ways to Protect Your Network TAGS: | | | | Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →

Default utility Image

Can open source solve PCI compliance problems? TAGS: | | | Open source software provides organizations with a community-developed, inexpensive alternative to commercial products. Many enterprises have turned to open source …Continue reading →

Default utility Image

What Security Vulnerabilities Should Be Fixed First? TAGS: | | Enterprises who begin a vulnerability management program often find themselves quickly faced with an intimidating avalanche of data. Scan results …Continue reading →

Default utility Image

Vulnerability Management In the Cloud TAGS: | As the security industry slowly moves toward the adoption of managed security service providers (MSSPs), one particular area is gaining …Continue reading →

Default utility Image

Managed Security Services in the Enterprise TAGS: | | | | Enterprises across a wide variety of industries are turning to cloud computing to reduce the burden on their IT support …Continue reading →

Default utility Image

Building a Vulnerability Management Program TAGS: | How vulnerable are your IT systems to an electronic intrusion?  If you think you’re safe, what evidence do you have …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple