As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

How to Spot a Potentially Violent Coworker

How to Spot a Potentially Violent Coworker

Workplace safety is and will always be a pressing concern. According to a study conducted by the Occupational Safety and Health Administration, we’re making a significant amount of progress in that regard – from a certain perspective. In the four...
Why You Can’t Trust Anyone These Days

Why You Can’t Trust Anyone These Days

It’s not paranoia, they really are out to get you. When the very organisations promoting IT security manage to botch it up, it’s difficult to have confidence in anything anymore. One of the latest cases of misplaced trust is the CCleaner software saga....
The New MIR3 Recipient App

The New MIR3 Recipient App

Our Clients Asked. We Delivered! We recently released a new version of our recipient app to make it even more useful and simple to use. The MIR3 Recipient App is a free companion app that users can download to their iOS or Android devices as a convenient way to...
FEMA: Group Flood Insurance — How It Works

FEMA: Group Flood Insurance — How It Works

If you are a survivor of Hurricane Irma, have flood damage, and no flood insurance coverage, you may receive a Group Flood Insurance Policy (GFIP) if you claimed disaster assistance for a home or personal belongings.   You may receive Group Flood Insurance...
What scares me

What scares me

An enraged man concealing a Glock .45 enters your facility to hunt down his ex A visitor loses consciousness during a meeting, and no one knows what to do as the critical first four minutes tick by The fire alarms go off, you think all of your people have evacuated,...
The History of Managed Services

The History of Managed Services

It all started with the rapid rise of technology. Businesses around the world decided that it was time to ditch the old school methods of communication. Instead, they decided to accept the future – and that’s when computers entered the picture. Along with...
Multi-Cloud Approaches Within Reach

Multi-Cloud Approaches Within Reach

Multi-cloud approaches are taking a bigger share of the market. More than 85 percent of enterprise IT organizations will commit to multi-cloud architectures by 2018, according to IDC. This will decrease the large cloud players’ monopolies and will lead to higher...
SUPERSTORM SANDY

SUPERSTORM SANDY

Five years ago this month (October 29), Superstorm (hurricane until a few hours before landfall) Sandy made landfall along the coast of New Jersey just northeast of Atlantic City.  Sandy was one of the most devastating hurricanes to hit the northeast United...
Beware of the Dark Side of the Cloud

Beware of the Dark Side of the Cloud

Cloud computing offers tremendous advantages and has spurred the continued growth of the as-a-service market. In fact, a recent McAfee report found that 93 percent of organizations utilize cloud in some form. Earlier this year Gartner predicted the public cloud...
WHY YOU CAN’T JUST SEND AN EMAIL

WHY YOU CAN’T JUST SEND AN EMAIL

The Problem with Emails Emails. How many do you get each day? How often do you check them? When I say “check,” I mean read. The average time spent reading an email is 11.1 seconds and only five seconds for a text. With instant communications available via...
Hitachi Data Systems Federal Changes Name

Hitachi Data Systems Federal Changes Name

New Moniker Represents Combined Expertise for Federal Customers to Leverage Full Potential of Agency Data   RESTON, Va. – Hitachi Data Systems Federal today announced it has changed its name to Hitachi Vantara Federal Corporation. The name...
When Ransomware Marries IoT

When Ransomware Marries IoT

For Cybercriminals, it’s a Match Made in Heaven This is an age in which ransomware has made the barrier to entry for would-be cybercriminals lower than ever. And, with the proliferation of IoT devices, for attackers, there’s ample opportunity to compromise...
Audit’s Increasingly Critical Role In GRC

Audit’s Increasingly Critical Role In GRC

The Need for Aligned Assurance Today’s changing risk landscape has put increased pressure on assurance functions to simplify their requirements and to provide the board, senior management and other key stakeholders with a complete risk and assurance picture. To...
Lessons Learned From Hurricane Sandy

Lessons Learned From Hurricane Sandy

Five years later, company uses new logistics to fight Harvey, Irma FORT WORTH, Texas – Nearing the five-year anniversary of Hurricane Sandy’s assault upon the Northeastern U.S., Interstate Restoration looks back upon that time with appreciation for the...
CALIFORNIA WILDFIRES: WHAT’S NEXT?

CALIFORNIA WILDFIRES: WHAT’S NEXT?

More than a dozen fires have burned more than 1,500 structures in Northern California, with more than a dozen dead as of Tuesday afternoon. CNN lays down the facts: More than 119,000 acres burned, much of it in wine country – Napa and Sonoma counties. Fires...
HOW TO PROTECT EMPLOYEES AGAINST HARASSMENT

HOW TO PROTECT EMPLOYEES AGAINST HARASSMENT

What are companies doing to protect employees against harassment? This question has added weight after the October 8 firing of Harvey Weinstein by the board of Weinstein Co. following reports of sexual harassment complaints against him. Earlier firings...
Explore Harvey’s Broad Reach

Explore Harvey’s Broad Reach

(TNS) – The flood maps that help determine where homes are built in Texas, how much insurance costs and which areas would benefit from flood control projects are based on rainfall data that hasn’t been updated for as long as a half-century, meaning that...
Don’t Overlook This Aspect Of The GDPR

Don’t Overlook This Aspect Of The GDPR

What Compliance Professionals Need to Know About Employee Data The deadline for the General Data Protection Regulation (GDPR) is on the horizon, and a customer’s information is not the only thing that should be on a compliance practitioner’s...
Minimizing Risk through Geospatial Technology

Minimizing Risk through Geospatial Technology

The Need for Regulatory Support Financial institutions and federal bank regulators can integrate location intelligence as a regulatory technology (Regtech) solution to ensure compliance with anti-money laundering (AML) standards, financial inclusion requirements, and...
Addressing the Bias Problem in Risk Management

Addressing the Bias Problem in Risk Management

Avoiding Blind Spots, Groupthink and Other Issues Though virtually every involved party was at fault to some degree, bias on multiple fronts was largely the cause of the 2008 financial crisis. Given that bias in risk management can result in a disastrous event such as...