Mike Chapple's Blog, page 6

May 5, 2019

A rebooted CCSP certification exam is coming

In just a few short months, the Certified Cloud Security Professional (CCSP) certification offered by IT security professional association (ISC)² …Continue reading →


The post A rebooted CCSP certification exam is coming appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on May 05, 2019 11:18

February 9, 2019

The CIO’s Playbook: Preparing for Data Breach Notifications

“The days and hours immediately after a data breach are critical,” said Mike Chapple, adjunct research analyst with IDC’s IT …Continue reading →


The post The CIO’s Playbook: Preparing for Data Breach Notifications appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 09, 2019 11:30

IDC PlanScape: Threat Intelligence Solutions

“Threat intelligence is a foundational component of a modern cybersecurity program,” says Mike Chapple, adjunct analyst with IDC’s IT Executive …Continue reading →


The post IDC PlanScape: Threat Intelligence Solutions appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 09, 2019 11:30

February 3, 2019

5 Tips for Updating a Cybersecurity Incident Response Plan

Many security teams are operating with incident response plans that haven’t been updated — or even looked at — in …Continue reading →


The post 5 Tips for Updating a Cybersecurity Incident Response Plan appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 03, 2019 15:25

IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education

“To continue to be relevant to society and to students, all institutions face the need to transform their academic capabilities …Continue reading →


The post IDC’s Worldwide Digital Transformation Use Case Taxonomy, 2019: Higher Education appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 03, 2019 15:24

Cloud Access Security Brokers Give IT Staff Visibility and Oversight

Colleges and universities are rapidly expanding their use of cloud services, ranging from complete infrastructure deployments to specialized applications. This leaves cybersecurity …Continue reading →


The post Cloud Access Security Brokers Give IT Staff Visibility and Oversight appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 03, 2019 15:23

December 16, 2018

Security Automation: Eight Things You Can Do Now for Security at Scale

“Automation plays an increasingly important role in cybersecurity programs,” said Mike Chapple, adjunct research analyst at IDC’s IT Executive Programs. “Automation serves …Continue reading →


The post Security Automation: Eight Things You Can Do Now for Security at Scale appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on December 16, 2018 09:40

IDC PlanScape: Launching a Bug Bounty Program

“Bug bounty programs incentivize security researchers to test your systems for weaknesses and then provide you with an opportunity to fix the …Continue reading →


The post IDC PlanScape: Launching a Bug Bounty Program appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on December 16, 2018 09:39

November 7, 2018

5 Steps to Integrate a Business’ Security Solutions

Your organization probably has a diverse set of security tools working to help reduce your risk profile and combat active …Continue reading →


The post 5 Steps to Integrate a Business’ Security Solutions appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on November 07, 2018 08:24

September 29, 2018

4 Ways to Keep Sensitive Data from Escaping to the Public Cloud

Think about how many cloud services you use every day. Chances are that it’s a mixture of services managed by your employer and others …Continue reading →


The post 4 Ways to Keep Sensitive Data from Escaping to the Public Cloud appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on September 29, 2018 05:33