As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

1.4 Billion Data Records Exposed in 2016

1.4 Billion Data Records Exposed in 2016

Gemalto yesterday released the findings of its Breach Level Index for 2016, which states that 1,792 data breaches worldwide led to the compromise of almost 1.4 billion data records last year, an increase of 86 percent over the previous year. Identity theft...
CYCLONE DEBBIE: STORM SURGE BIGGEST THREAT

CYCLONE DEBBIE: STORM SURGE BIGGEST THREAT

More than 30,000 people in low-lying coastal areas have been urged to evacuate their homes ahead of powerful Cyclone Debbie, as it bears down on the Queensland coast in northeastern Australia. With landfall expected early Tuesday, Cyclone Debbie is currently a...
Crowds in Crises

Crowds in Crises

Back in 2015 the world was captivated by the Universal film “Jurassic World”. Viewers praised Chris Pratt’s performance in this science fiction thriller, but were more entertained by a different kind of hero. During a pterosaur attack causing resort...
Cisco Completes Acquisition of AppDynamics

Cisco Completes Acquisition of AppDynamics

Together, AppDynamics and Cisco will give customers comprehensive visibility from code to consumer and everything in-between SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) today announced that it has completed the acquisition of AppDynamics, a leader in application and...
Making the Most of Available Storage

Making the Most of Available Storage

No matter how scaled-out, hyperconverged or abstracted data center infrastructure becomes, one element remains the same: Servers need high-speed access to vast amounts of storage. This produces a paradox, however, because as more storage comes online, it takes longer...
Spring-Ready With Flood Insurance

Spring-Ready With Flood Insurance

It’s the first day of Spring and here in New Jersey we’re expecting a balmy 50 degrees Fahrenheit. Rising temperatures + snowmelt = flooding. NOAA’s Spring Outlook calls for moderate to major flooding in northern North Dakota and in the Snake River...
How Business Continuity Goes to the Movies

How Business Continuity Goes to the Movies

Vendors like to go to the movies, meaning they like to see their products and logos in Hollywood productions, and are usually prepared to pay for the privilege. Cars, computers, canned beverages, you can surely think of examples you’ve seen, as heroes, heroines,...
Thriving Despite Cyber Risk

Thriving Despite Cyber Risk

Privacy is a human right, and at the core of the privacy principles is Article 8 of the European Convention on Human Rights. In the new digital world, where information-sharing is prevalent, the need to protect individuals’ privacy is important, but we are...
Sysadmins: You’re All Developers Now

Sysadmins: You’re All Developers Now

In a past life I was a system administrator, or “sysadmin”. I enjoyed it, but even in those halcyon days of remoting into servers and driving to the office at 2 AM (hoping the server room wasn’t on fire), I knew I had a limited shelf life....
IT Automation: Where, When and How?

IT Automation: Where, When and How?

The enterprise is anxious to automate as much of its data ecosystem as possible, starting with the cloud. But is automation the best solution for every challenge, and if not, how can enterprise executives determine what should be automated and what should remain under...
Risk Management and the Value Proposition

Risk Management and the Value Proposition

If you haven’t noticed lately, risk management is going through a global transformation wherever you look! The COSO ERM framework is being revised with a new tagline, Enterprise Risk Management – Aligning Risk with Strategy and Performance.  Dennis...
The Flaw in Ransomware

The Flaw in Ransomware

Ransomware has experienced a meteoric rise over the last two years, and I contend that it is due for a meteoric fall. Here’s why: As unlikely as it may seem, Ransomware relies solely upon trust. Many of the criminals behind ransomware appear to have an...
Here’s the Number – Go Make it Happen!

Here’s the Number – Go Make it Happen!

Big Boss calls you into his office and gives you the quarterly revenue number he wants you to report.  He tells you “this is the number, now go make it happen.” What options do you have here and what consequences are you willing to accept in this...
Winter Storm Damage? Insurers Have You Covered

Winter Storm Damage? Insurers Have You Covered

Most likely snowfall for #Blizzard2017 in the NY/NJ metro area now looks like this, per the National Weather Service New York: While major cities in the Northeast may have been spared blizzard conditions, a strong winter storm is still unfolding and inland areas are...
BCI: Identity fraud reaches record levels

BCI: Identity fraud reaches record levels

The Business Continuity Institute Identity fraud has hit the highest levels ever with 172,919 identity frauds recorded in 2016, more than in any other previous year. The study by Cifas showed that identity fraud now represents over half of all fraud recorded in...
BCM 4000: ISO 22301 Assessor

BCM 4000: ISO 22301 Assessor

Does Your Business Continuity Program Measure Up?      Audience  Those with business continuity management program experience, internal auditors, and consultants.  Wondering how your BCM program aligns to ISO 22301? Looking for a way to...
3 Fatal Mistakes Most Risk Consultants Make

3 Fatal Mistakes Most Risk Consultants Make

Warning: this article may upset some conservative risk managers. Risk management in modern nonfinancial companies is very different compared to, say, five years ago. The level of risk management maturity, for lack of a better word, has grown significantly. As...
Confronting the Hyperscale Storage Challenge

Confronting the Hyperscale Storage Challenge

Enterprises looking to scale out their own data infrastructure quickly run into a problem: While more computing and networking capacity can be squeezed out of existing hardware, storage cannot. Sure, you can make improvements to I/O, IOPS, management capabilities and...
Vision Solutions Debuts MIMIX for AIX 5.1

Vision Solutions Debuts MIMIX for AIX 5.1

MIMIX for AIX family offers enhanced replication, easier management and monitoring, and expanded platform support IRVINE, Calif. – Vision Solutions, a leading provider of business resilience solutions for IBM Power Systems, announced today the availability of...
Convincing Management To Do a BIA

Convincing Management To Do a BIA

Those of us with feet on the ground understand the value BIA (Business Impact Analysis) data brings when it comes to strategy development and prioritization, but how can we convince resource/financial decision makers and project stakeholders to approve a BIA? Almost...
52% Of Workers In The U.S. Work Remotely

52% Of Workers In The U.S. Work Remotely

The working world has tipped the balance in favor of flexibility DALLAS – Latest research commissioned by Regus, the flexible workspace provider, shows that over half of workers in the United States now work from outside their company’s main offices for...
BCI: Broadening exposure and horizons

BCI: Broadening exposure and horizons

The Business Continuity Institute It has been just over two years since I was featured in the Business Continuity Institute’s ’20 in their 20s: The future of business continuity’ publication, so I thought it might be useful to look through what...
ISO 37001: Anti-Bribery Management Systems

ISO 37001: Anti-Bribery Management Systems

India was ranked 40th in the latest Corruptions Perceptions Index report by Transparency International. It appears that the recent reforms and regulatory actions did not have an impact on the perceptions influencing India’s CPI rankings. With Indian...
BCI: Horizon Scan Report 2017

BCI: Horizon Scan Report 2017

Andrew ScottSenior Communications Manager at the Business Continuity Institute (BCI) What are the threats facing your organization? As a business continuity or resilience professional, what is it that concerns you the most? For the majority of people, it is the...
Cybersecurity: Defense is the best defense

Cybersecurity: Defense is the best defense

You defend your home, you defend your car, and it’s important you do the same for your network and all the resources it encompasses. How to defend your network? The most basic defensive tools include anti-virus and anti-malware software, which should be present...
Business Continuity and Multipathing

Business Continuity and Multipathing

Sometimes, IT can teach business a thing or two. In a recent survey on private cloud computing use, there was a statistic on the use of multipathing. Based on data collected from more than 100 private cloud environments, the statistic showed that 96% of the...