As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

Big Data Experts in Big Demand

Big Data Experts in Big Demand

Data scientist, named the best job in America for 2016 by the job site Glassdoor, is a mashup of traditional careers, from data analysis, economics, and statistics to computer science and others. Although tech companies Microsoft, Facebook, and IBM employ the...
Top Storage Technology Letdowns

Top Storage Technology Letdowns

DataCore recently released the findings of its latest survey, which point to some disappointment in the technologies that are purported to enable next-generation storage workloads and make life a little easier for overworked IT administrators. After quizzing 426 IT...
Large Venues Reviewing Security Measures

Large Venues Reviewing Security Measures

Venues that attract crowds, such as large sports events and concerts are reviewing their security measures, both inside and out, to prevent an attack such as the suicide bombing after an Ariana Grande concert in Manchester, England, that killed at least 22 people....
TierPoint to Build Second Tulsa Data Center

TierPoint to Build Second Tulsa Data Center

TULSA – TierPoint LLC today announced plans to build a new state-of-the-art data center in the Tulsa area. Partnering with Compass Datacenters, TierPoint’s ultimate plan for the new facility anticipates approximately 60,000 sq. ft. of total space. The...
CEO Forum: WannaCry Raises the Red Flag

CEO Forum: WannaCry Raises the Red Flag

Cybercrime is one of the biggest challenges society faces today. As the world becomes more digitized and dependent on connected systems and devices, the threat and the potential impact is exponential. As we just recently witnessed the WannaCry attack, this is a...
BCI: US more prepared for GDPR than UK

BCI: US more prepared for GDPR than UK

The Business Continuity Institute With only one year to go before the European Union General Data Protection Regulations (GDPR) deadline, many US businesses with European customers are not fully prepared to comply with the new laws, which include ‘Right to be...
The Case for Compliance Automation

The Case for Compliance Automation

Digital transformation is a must in today’s competitive landscape, radically speeding the pace of operations and increasing the demands placed on businesses to deliver new experiences. Businesses that embrace digital transformation will capitalize on this...
Where All-Flash Storage Makes No Sense

Where All-Flash Storage Makes No Sense

“Go all-flash, young man,” appears to be the current mantra of the storage industry. Vendor after vendor is urging enterprises to ditch hard disk drives (HDDs) in favor of solid state drives (SSDs). You also hear about flash-first strategies that urge...
Business Continuity and Machine Learning

Business Continuity and Machine Learning

According to certain industry analysts and software vendors, we are now midway between a stage 10 years ago when few applications used machine learning, and a stage 10 years into the future when apparently, most applications will function with it. The Gartner...
The Data Digest: The Information Power Play

The Data Digest: The Information Power Play

Recent incidents remind us that knowledge is power. Earlier this week, US President Trump shared classified information with foreign delegates — and by doing so, he potentially declassified it. When The Washington Post exposed the headline first, the article...
BCI: Cyber security in the WannaCry age

BCI: Cyber security in the WannaCry age

The Business Continuity Institute Quite often with cyber security, the public sees what might appear to be a game of cat and mouse: the perpetrators (bad guys) attack, then the cyber security establishment (government, private companies, and so on; the good guys)...
FEMA: Prepare Now for Hurricane Season

FEMA: Prepare Now for Hurricane Season

BATON ROUGE, La. — Hurricane season officially begins June 1 and FEMA urges Louisianans to prepare. Getting ready now goes a long way in saving lives and reducing property damage later. Readiness for the tropical season depends on preparing, planning and staying...
New Book Helps Children Prepare For Disaster

New Book Helps Children Prepare For Disaster

We are excited to announce the release of Elephant Wind. Elephant Wind is a picture book designed to help children learn about tornados and how to respond to a warning so that they can keep safe. It is the first in an expected series of picture books by Train 4 Safety...
What is a DoS Attack?

What is a DoS Attack?

The web offers a lot of opportunities, but with them, threats are sure to follow. The faster the technological advance, the more security gaps appear. Just in the last year, we’ve seen an unprecedented increase in the number of denial of service (DoS) attacks....
Turn GDPR Compliance into Lemonade

Turn GDPR Compliance into Lemonade

“When life gives you lemons, make lemonade,” goes the popular saying, which inspires us to tackle life’s challenges in a positive way to help us grow and learn from hardships. For organizations struggling to meet the upcoming GDPR compliance deadline...
Data is the perimeter, defend it that way

Data is the perimeter, defend it that way

Data is the perimeter, defend it that way Unless you have been living under a rock or possibly hiding in the mountains of Montana with a giant beard and eating way too many government issued MRE’s you probably heard about the nuclear bomb of a ransomware attack...
Compliance in a Connected World

Compliance in a Connected World

The Internet of Things (IoT) is rapidly expanding. Our homes, cars and workplaces are filling with connected devices designed to cater to our personalized needs. They respond to our instructions, whether delivered through a mobile app or a spoken command, and they...
New form, structure or just appearance?

New form, structure or just appearance?

Did you watch the Snowden video? Life (and our work) would be more predictable if everything existed in the Ordered Domain – but in the real world it doesn’t. Our organisations, especially when viewed in the contemporary risk/threat/vulnerability...
Make Your Hurricane Preparations Now

Make Your Hurricane Preparations Now

With the Atlantic hurricane season’s official start on June 1, the time to check your buildings and existing contingency plans—or start a new one—is now, during hurricane preparedness week. For 2017, Colorado State University’s hurricane...
Survey: Protecting the Modern Mobile Workforce

Survey: Protecting the Modern Mobile Workforce

      With the continued proliferation of mobile communications, employees continue to spend less time in a fixed office location. According to the International Data Corporation, by 2020, mobile workers will account for 72% of the total United States...
Remembering Dr. Tom Phelan

Remembering Dr. Tom Phelan

The Board of Directors at Private and Public Businesses, Inc. (PPBI) mourns the loss of our friend, Board of Advisors and key contributor to the Emergency Planning, Response, Business Continuity and Academic communities which he served, Dr. Thomas D. Phelan. In...
2017 Cyber Threats

2017 Cyber Threats

In today’s age of having everything online, not only can your consumers or employees face passive threats in just about every social platform imaginable, but institutions are prone to actively exposing confidential data. Compliance Complications Draft EU Data...
IT During A Merger

IT During A Merger

At Greater Risk for an IT Disaster? According to the Harvard Business Review, 60 percent of all mergers and acquisitions (M&A) end up destroying shareholder value. While much of this failure is caused by a strategic mismatch between the two organizations, smooth...
Buying Guide: All-Flash Storage

Buying Guide: All-Flash Storage

All-flash storage is clearly on the up-and-up. Gartner analyst Valdis Filks predicts that by 2020, 50 percent of data centers will use only all-flash arrays (AFA) for primary data, up from less than 1 percent in the middle of 2016. Overall, Gartner expects flash to be...
Data Centers Need Better SLAs

Data Centers Need Better SLAs

Service Level Agreements (SLAs) need to cover all aspects of a business and their subsidies, which means they are often broad and generic and can leave your data center unprotected. The SLA made with the Original Equipment Manufacturers (OEMs) is used as a way to...
The Art & Science Behind Analytics Processes

The Art & Science Behind Analytics Processes

This is part 4 of a multi-part series on the Analytics Operating Model. As we move forward in our blog series on the Analytics operating model, we pinpoint the essential processes for delivering analytics. Data may be a prerequisite for most of these processes, but a...
Cisco Announces Intent to Acquire MindMeld

Cisco Announces Intent to Acquire MindMeld

Artificial Intelligence acquisition to power new conversational interfaces for Cisco’s collaboration suite SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) announced today its intent to acquire MindMeld Inc., a privately held artificial intelligence (AI) company...
CREATING A COORDINATED APPROACH TO ASSURANCE

CREATING A COORDINATED APPROACH TO ASSURANCE

Assurance functions are on the rise. With continued proliferation in global regulations and increased public scrutiny of corporate behavior, companies have made significant investments in assurance programs (e.g., compliance, information security, quality) and control...
Why You Are Getting Disrupted

Why You Are Getting Disrupted

The overriding theme of every disruption story I’ve ever heard is that firms thought they had more time than they did. So, I’ve been pondering the why. We can see disruption happening all around us, but whyis it so difficult to get out in front...
Navigating Risk Management Around the Globe

Navigating Risk Management Around the Globe

Over the past few years, I’ve had the wonderful opportunity to travel the world and visit factories, distribution centers, ports, warehouses, and several offices for the company where I work. Apart from being a great way to see the world, it has also been an...
The Three Phases of Disaster Recovery

The Three Phases of Disaster Recovery

In our Business Continuity and Disaster Recovery planning, we spend much of our time assessing, documenting and developing strategies for when an event may occur. This is all to prepare for or prevent an outage. What is the point of all these preparations? When...
FEMA Hazard Mitigation Grants: 404 and 406

FEMA Hazard Mitigation Grants: 404 and 406

Key Message: Section 404 hazard mitigation and Section 406 hazard mitigation funding are distinct programs with  key differences in their scope, purpose and funding. Section 404 – Hazard Mitigation Grant Program The 404 funding is used to provide protection...
BCI: Managing the supply chain

BCI: Managing the supply chain

The Business Continuity Institute Having an effective business continuity programme does not just mean making sure your own organization has a plan in place to deal with disruptions, it also means ensuring that your supply chain is resilient too. How would your...
Types of DDoS Attacks

Types of DDoS Attacks

Distributed Denial of Service attacks (DDoS) are a favorite attack method of hackers and hacktivists, in large part due to their simplicity.  We list the different types of DDoS attacks and offer resources to stop DDoS attacks. What is a DDoS attack?  So...
Using Technology to Educate (Not Regulate)

Using Technology to Educate (Not Regulate)

The Problem Most companies are making progress with compliance – they have codes of conduct, are working to improve their cultures and are hiring staff including compliance, diversity, privacy and ethics officers. These companies should be credited for laying...
Back to the Future?

Back to the Future?

One of the predictable things about the BC industry is that periodically there is a bout of introspection – we are in a bad spot, how do we change to move forward? The predictable outcome is that little actually changes other than the name – Disaster...
Small Business Insurance Is Going Digital

Small Business Insurance Is Going Digital

The way in which small business owners buy insurance is changing, as the number of ventures owned by Millennials/GenXers increases. Up to 25 percent of total small business insurance premium could be digitally underwritten by 2020, Willis Towers Watson Securities...
Cloud Growth Slows, Slightly

Cloud Growth Slows, Slightly

The cloud is still growing by leaps and bounds, but not as fast as it was at the beginning of the decade. But it is unclear if this represents a long-term trend as the market reaches the front end of a traditional bell curve, or just a minor pause in the...
Cisco Announces Intent to Acquire Viptela

Cisco Announces Intent to Acquire Viptela

Cloud-based SD-WAN Solution Offers Flexibility to Global Enterprises and Telecom Carriers SAN JOSE, Calif. – Cisco (NASDAQ: CSCO) announced today its intent to acquire Viptela Inc., a privately held software-defined wide area network (SD-WAN) company based in...