As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

Hybrid Cloud Storage: Guide for Businesses

Hybrid Cloud Storage: Guide for Businesses

It’s no surprise that hybrid cloud storage is growing. Hybrid cloud itself is an increasingly popular approach to deploying IT services. In fact, Gartner predicts that 90 percent of enterprises will be using hybrid infrastructure management capabilities by 2020....
The True Cost Of Compliance

The True Cost Of Compliance

Making Sense of Dollars and Cents With the upcoming GDPR directive on everyone’s minds, compliance is a hot issue. Many see compliance as an unnecessary additional expenditure. What they fail to realize, however, is that noncompliance costs nearly three times as...
Public Cloud Storage: Guide for Businesses

Public Cloud Storage: Guide for Businesses

Public cloud storage is an effective way for businesses to access massive amounts of data storage capacity and advanced storage management capabilities with pay-as-you-go pricing and without massive up-front investments. Today, it’s not uncommon for...
The Power Of Whistleblowers In The Modern Age

The Power Of Whistleblowers In The Modern Age

Lessons Learned from the Trenches The #MeToo and #TimesUpNow social media campaigns sparked a movement to expose intimidating behavior and sexual assault in the workplace. Because of the resulting paradigm shift, harassed employees are empowered to speak up about...
Managing Cloud Storage Migration

Managing Cloud Storage Migration

Migrating and managing your data storage in the cloud can offer significant value to the business. Start by making good strategic decisions about moving data to the cloud, and which cloud storage management toolsets to invest in. Your cloud storage vendor will provide...
Enterprise Backup and Recovery Management

Enterprise Backup and Recovery Management

Data storage backups seem like a simple enough way of protecting valuable business data against accidental erasure, application crashes, server mishaps, ransomware and the countless other ways data winds up irretrievable. IT leaders soon discover that managing a...
6 Steps To Minimize Conduct Risk

6 Steps To Minimize Conduct Risk

A Framework for Assessing Regulatory Maturity In the current regulatory environment, banks find it complex and challenging to interpret and assess regulatory requirements on conduct risk.  In this this article, experts from Tata Consultancy Services suggest a...
Cryptocurrency Challenges And Opportunities

Cryptocurrency Challenges And Opportunities

Leveraging Compliance to Build Regulator and Customer Trust Bitcoin and other cryptocurrencies continue to gain ground as investors buy in, looking for high returns, and as acceptance of it as payment takes hold. However, with such growth come risks and challenges...
IT Systems Management and the 5 S’s

IT Systems Management and the 5 S’s

We may live in a digital age, but much of the concepts from the previous industrial era still carries through. We have virtual cloud data factories and production lines, just like their physical counterparts for making cars, furniture, aircraft and so on. IT systems...
Data Storage: Turning Data into Information

Data Storage: Turning Data into Information

As we start moving into the deep learning and AI world, it might be a good idea to reflect on how we went from basic data collection to an information-based world. Stored data is just stuff until you can figure out how to turn it into actionable information, and...
Moving Targets That Reinvent Themselves

Moving Targets That Reinvent Themselves

Suitability Surveillance and Controls Despite how many risk and compliance eyes an investment bank has inspecting client activity, when it comes to managing risk, it’s impossible to review each and every investment recommendation or transaction by a simple...
Building Disaster Resilience

Building Disaster Resilience

Resilience is a buzz word currently being tossed around and twisted to meet the criteria of the writer, grant proposal or academic looking to publish a paper. One could argue that you are looking to establish resilience in every aspect of the four phases of emergency...
Balancing Velocity And Security In The Cloud

Balancing Velocity And Security In The Cloud

Adopting New Strategies to Increase Agility In order to capitalize on cloud velocity, organizations must adopt new approaches and tools developed for the cloud. Failing to do this will delay migration, weaken overall security posture and cost time and money, losing...
Storage Networking Hardware and Solutions

Storage Networking Hardware and Solutions

In today’s enterprises, often the whole point of collecting and generating data is to capture its value and capitalize on it. That requires moving it from storage systems to servers or other systems across a network for processing, which typically means that...
Hard Disk Drives: An Overview

Hard Disk Drives: An Overview

Hard disk drives have been around forever, if you define “forever” as 1953. In 2018 they are still the backbone of data storage, even with fast-growing SSD sales and the tenacity of tape. Let’s look behind the curtains at modern HDD technology,...
5 Career Tips for Women in Technology

5 Career Tips for Women in Technology

Millennial women have embraced STEM and are steadily driving up the percentage of women pursuing technology careers. But finding women in technology leadership roles is still rare. Although women have been involved in “computing” since the late...
How Much Disruption will AI Cause?

How Much Disruption will AI Cause?

A huge amount of innovation is taking place around AI right now. Many, including Cutter Consortium Senior Consultant Curt Hall, think AI has the potential to disrupt lots of industries, including banking/financial services, healthcare, automotive, retail,...
Cyber Security and the Legal Sector

Cyber Security and the Legal Sector

It’s commonplace to see articles and discussions about cyber security and the law, but this article is not about that. It is about cyber security and law firms, those august institutions with their lawyers, barristers, and attorneys. Legal firms benefit from a...
Netwrix Supports Charity Projects in California

Netwrix Supports Charity Projects in California

Netwrix funds local non-profit organizations in California to protect the environment, preserve local landmarks, fund medical research and support children education and well-being IRVINE, Calif. — Netwrix Corporation, provider of a visibility platform for user...

Call For Papers – DRJ Spring 2020

DRJ Spring 2020: A Clear Vision of Risk & Resiliency Conference: DRJ Spring 2020 – CFP CLOSES OCTOBER 14, 2019 Dates: March 15-18, 2020 Location: Disney’s Coronado Springs Resort City: Orlando, FL DEADLINE EXTENDED: October 14, 2019 SUBMIT YOUR...
Why Outsource Your Infrastructure?

Why Outsource Your Infrastructure?

Technology is not like a fine wine. It doesn’t get better with age. This fact can hit a company pretty hard. When you realize your technology has depreciated significantly enough that it causes damage to your company’s productivity, you’re now in the...
Creating a safety culture in Latin America

Creating a safety culture in Latin America

A prevalence of high-risk industries such as mining, exposure to powerful pesticides in agriculture and the exacerbation of risks due to climate change, these are just some of the factors that contribute to occupational health and safety hazards in Latin America. But...
Disaster Recovery Planning

Disaster Recovery Planning

A disaster recovery plan is an insurance policy, of sorts. Your business needs a DR plan because a well-implemented disaster recovery plan will make your IT infrastructure whole when disaster strikes. More than an offsite data center and a collection of tools for data...
How the Military Use Tabletop Exercises

How the Military Use Tabletop Exercises

A military background isn’t necessary to run a successful tabletop exercise or war gaming scenario The idea of war gaming as a resource to practice strategic planning and increasing your readiness for the worst-case scenarios has been around for hundreds, if not...
Enterprise Backup and Recovery Software

Enterprise Backup and Recovery Software

Enterprise backup software is a safety net that keeps businesses running when application errors, cyber-attacks, negligent workers and countless other IT mishaps strike. Technical approaches between vendors vary somewhat, as do each organization’s data...
Bringing Home the Bronze is as Good as Gold

Bringing Home the Bronze is as Good as Gold

It’s been 16 years since an American woman won a speed skating medal at the Winter Olympics, but last week, Team USA brought home the Bronze in the Long Track Relay. Bronze is no laughing matter, with the American women beating Canada by a mere .45 seconds. An...
MapR Extends Data Fabric for Kubernetes

MapR Extends Data Fabric for Kubernetes

Enables Deployment of Stateful Applications across Clouds   SAN JOSE, Calif. –MapR® Technologies, Inc., a pioneer in delivering one platform for all data, across every cloud, today announced at Strata Data Conference it has extended advanced containers...
ICOR Critical Environments 2018 Course Schedule

ICOR Critical Environments 2018 Course Schedule

Aligning Mission-Critical Education and Certification to the Workplace 2018 Course Schedule Critical Environments Education & Credentialing Program Instructor Led & eLearning The ICOR Difference Courses and certifications are tied to a job analysis so that you...
Using DMARC Effectively

Using DMARC Effectively

Implementing DMARC is one thing. Making the commitment to implement DMARC in its most aggressive configuration is another. Conceptually, Domain-based Message Authentication, Reporting, and Conformance (DMARC) is simple. DMARC provides a mechanism for email receivers...