Mike Chapple's Blog, page 5

May 29, 2019

Becoming a data security administrator is a great pathway into cybersecurity

In a recent survey of Chief Information Officers, 88 percent reported that cybersecurity initiatives were on their shortlist of priorities for …Continue reading →


The post Becoming a data security administrator is a great pathway into cybersecurity appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 29, 2019 04:27

Password-Based Attacks Pose New Dangers for Agency Networks

Last year, the United States Computer Emergency Readiness Team (US-CERT) issued an alert that hackers were targeting organizations in the …Continue reading →


The post Password-Based Attacks Pose New Dangers for Agency Networks appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 29, 2019 04:25

May 5, 2019

Big Tech can’t be trusted. It’s time for regulation

Big Tech is under the spotlight, and for good reason. In the past couple of years, an onslaught of incidents …Continue reading →


The post Big Tech can’t be trusted. It’s time for regulation appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 12:19

Does Your Business Need Unified Endpoint Management?

Consider how many endpoint device types exist in the typical business: Virtually all have desktop and laptop computers, as well …Continue reading →


The post Does Your Business Need Unified Endpoint Management? appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 12:14

Five Ways to Modernize Digital Certificate Management

“Digital certificates aren’t the most exciting issue in IT, and they’re not top of mind for most senior IT leaders …Continue reading →


The post Five Ways to Modernize Digital Certificate Management appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 12:13

5 Ways to Safeguard Student Information

Schools handle a wide variety of sensitive information concerning students and their families. Laws, regulations and ethical obligations require administrators …Continue reading →


The post 5 Ways to Safeguard Student Information appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 12:09

Nine pitfalls to avoid on your path to certification

Over the past two decades, I’ve helped thousands of people earn cybersecurity certifications through my books, video courses, and online …Continue reading →


The post Nine pitfalls to avoid on your path to certification appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 12:06

Designing a Risk Management Strategy for SaaS Solutions

“Organizations are adopting cloud technology as a routine business practice. SaaS vendors offer compelling business cases for reducing cost, increasing …Continue reading →


The post Designing a Risk Management Strategy for SaaS Solutions appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 11:56

Evaluating Intrusion Prevention Systems in Higher Education

Colleges and universities continue to find themselves the targets of large-scale cyberattacks. Some of these come from foreign sources, such …Continue reading →


The post Evaluating Intrusion Prevention Systems in Higher Education appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 11:32

How Government Can Leverage CASBs and Improve Cloud Visibility

Agencies may already have tools in place to track the presence of sensitive information within internal systems, but the process …Continue reading →


The post How Government Can Leverage CASBs and Improve Cloud Visibility appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 11:24