Information Security Leader, Author, Instructor and Speaker

Default utility Image

Real-Life Use Cases for Vulnerability Management and Best Practices TAGS: In a presentation with my colleague Thomas Siu of Case Western Reserve University, I shared our experience with vulnerability management …Continue reading →

Default utility Image

Vulnerability Scanning at Notre Dame TAGS: I had the privilege of presenting Vulnerability Scanning at Notre Dame with colleagues from Qualys at EDUCAUSE 2011. Review my …Continue reading →

Default utility Image

Nessus and other vulnerability scanning options TAGS: | A recent analysis by SPI Dynamics revealed that approximately a quarter of patches released by Microsoft during the past two …Continue reading →

Default utility Image

Using Nessus Attack Scripting Language (NASL) to find application vulnerabilities TAGS: | In earlier parts of the Nessus 3 Tutorial, topics included how to install and configure Nessus, and how to run …Continue reading →

Default utility Image

How to run a Nessus system scan TAGS: | In our previous tip in this series on using Nessus in the enterprise, we detailed the process of downloading and …Continue reading →

Default utility Image

How to install and configure Nessus TAGS: | If you’ve been around the information security profession for any length of time, you probably have at least a passing …Continue reading →

Default utility Image

Nessus: Vulnerability scanning in the enterprise TAGS: | To get started, open the Nessus client by choosing it from the Start Read the full article: Nessus: Vulnerability scanning …Continue reading →

Default utility Image

Getting the best bargain on network vulnerability scanning TAGS: | How do you handle vulnerability scanning on your enterprise network? If you’re like many of your peers, you’ve either invested …Continue reading →

Default utility Image

Vulnerability scanning review: PatchLink’s PatchLink Update 6.3 TAGS: | Keeping systems patched can be a nightmare for enterprises. Medium- and large-sized enterprises will find this automated patching tool from …Continue reading →

Default utility Image

Getting started with Nessus: How to install and configure the open source vulnerability scanner TAGS: | If you’ve been around the information security profession for any length of time, you probably have at least a passing …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple