Mike Chapple's Blog

April 30, 2021

When Is a Business Ready for a Red Team Test?

Cybersecurity teams spend countless hours designing, implementing and managing security controls to protect against confidentiality, integrity and availability threats. Teams …Continue reading →

The post When Is a Business Ready for a Red Team Test? appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on April 30, 2021 03:12

April 16, 2021

Essentials to Consider When Choosing a Cloud Security Posture Management Solution

Today, cloud computing plays a central role in the technology ecosystems of every college and university. The degree of cloud …Continue reading →

The post Essentials to Consider When Choosing a Cloud Security Posture Management Solution appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on April 16, 2021 14:29

March 18, 2021

How Agencies Can Tackle Supply Chain Cybersecurity Threats

Cybersecurity professionals have worried for years about the insidious risk posed by supply chain attacks — that sophisticated attackers with the ability …Continue reading →

The post How Agencies Can Tackle Supply Chain Cybersecurity Threats appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on March 18, 2021 08:01

March 17, 2021

GDPR and CCPA: Businesses Must Comply With Both, and They’re Not the Same

The past few years presented businesses around the world with a dizzying array of new and changing requirements for handling …Continue reading →

The post GDPR and CCPA: Businesses Must Comply With Both, and They’re Not the Same appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on March 17, 2021 01:27

February 27, 2021

How Agencies Can Secure Data from Shared Documents After Users Leave

A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

The post How Agencies Can Secure Data from Shared Documents After Users Leave appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 27, 2021 00:12

February 10, 2021

IDC PlanScape: IT Security ? Building Enterprise Cyber-Resilience

Fortunately, information technology (IT) professionals can draw upon the long history of resilience engineering in other fields to develop their …Continue reading →

The post IDC PlanScape: IT Security ? Building Enterprise Cyber-Resilience appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 10, 2021 08:05

IDC PlanScape: Privacy Engineering

“Meeting privacy expectations of management and stakeholders requires a cross-functional approach with contributions from business leaders, privacy professionals, technologists, and …Continue reading →

The post IDC PlanScape: Privacy Engineering appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 10, 2021 08:01

IaaS Offers Critical Agility, Scale and Innovation for School Districts

Last spring’s rapid shift to remote learning may have taken many education IT teams by surprise, but the technology supporting …Continue reading →

The post IaaS Offers Critical Agility, Scale and Innovation for School Districts appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 10, 2021 07:57

How to Choose an Identity and Access Management Solution for Higher Education

From a string of high-profile ransomware attacks to the compromise of SolarWinds network monitoring tools, higher education continues to find …Continue reading →

The post How to Choose an Identity and Access Management Solution for Higher Education appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 10, 2021 07:53

February 6, 2021

5 key ransomware protection best practices to safeguard assets

Ransomware attacks are expected to grow both in frequency and effectiveness in 2021, with researchers at Cybersecurity Ventures predicting attacks …Continue reading →

The post 5 key ransomware protection best practices to safeguard assets appeared first on Mike Chapple, CISSP, Ph.D..

 •  0 comments  •  flag
Share on Twitter
Published on February 06, 2021 03:30