As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

When Donations Come Back to Haunt You

When Donations Come Back to Haunt You

Large donations by companies and family foundations provide the cornerstone for many prominent nonprofit organizations. But when those donations become shrouded in negative publicity, recipients must weigh their value against the damage to the organization’s own...
Lessons from BlackRock’s Data Leak

Lessons from BlackRock’s Data Leak

In January, BlackRock accidentally leaked confidential sales data by posting spreadsheets unsecurely online – certainly not the first time we’ve seen sensitive information “escape” an organization. Incisive CEO Diane Robinette provides guidance...
DDoS Attack Size Drops 85% in Q4 2018

DDoS Attack Size Drops 85% in Q4 2018

The sharp decline follows an FBI takedown of so-called “booter,” or DDoS-for-hire, websites in December 2018. The average distributed denial-of-service (DDoS) attack size shrunk 85% in the fourth quarter of 2018 following an FBI takedown of...
The Case of the Missing Data

The Case of the Missing Data

The latest twist in the Equifax breach has serious implications for organizations. When the Equifax breach — one of the largest breaches of all time — went public nearly a year-and-a-half ago, it was widely assumed that the data had been stolen...
Crowdsourced vs. Traditional Pen Testing

Crowdsourced vs. Traditional Pen Testing

A side-by-side comparison of key test features and when best to apply them based on the constraints within your budget and environment. Crowdsourced security has recently moved into the mainstream, displacing traditional penetration-testing companies from what once...
Has the Road to Settlement Gotten Bumpier?

Has the Road to Settlement Gotten Bumpier?

The Royal Commission into Misconduct in the Banking, Superannuation and Financial Services Industry (the Banking Royal Commission, or BRC) has been in Australian media headlines since the Commission was established on December 14, 2017. On February 4, 2019, the widely...
Prepared for Disaster in Cape Cod

Prepared for Disaster in Cape Cod

(TNS) – More practical — and perhaps more stylish — than the latest fashion handbag, a bright red emergency preparedness “go bag” distributed by the Department of Homeland Security might be even harder to land than next season’s...
Compliance Can Spark Joy, Right?

Compliance Can Spark Joy, Right?

Lesley Maea suggests compliance today could take a cue from Marie Kondo in her Netflix hit, “Tidying Up.” To remain safe and secure, use an intranet as a single source of truth. Yes, you read that right: an intranet. Put everything in one place. Then, you...
Ransomware’s New Normal

Ransomware’s New Normal

GandCrab’s evolution underscores a shift in ransomware attack methods Don’t be fooled by the drop in overall ransomware attacks this past year: Fewer but more targeted and lucrative campaigns against larger organizations are the new MO for holding data...
Citrix Breach Underscores Password Perils

Citrix Breach Underscores Password Perils

Attackers used a short list of passwords to knock on every digital door to find vulnerable systems in the vendor’s network. The recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major...
The 12 Worst Serverless Security Risks

The 12 Worst Serverless Security Risks

A new guide from the Cloud Security Alliance offers mitigations, best practices, and a comparison between traditional applications and their serverless counterparts. Serverless computing has seen tremendous growth in recent years. This growth was accompanied by a...
How to Enhance Information Security Efforts

How to Enhance Information Security Efforts

Evan Francen, CEO of FRSecure and Security Studio, makes the case for adopting a third-party information security risk management (TPISRM) program. He outlines how to get started and explains why the common excuses for ignoring the risks don’t hold water....
Data And Analytics Leaders, We Need You!

Data And Analytics Leaders, We Need You!

How do you create an insights-driven organization? One way is leadership. And we’d like to hear about yours. Today, half of the respondents in Forrester’s Business Technographics® survey data report that their organizations have a chief data officer...
Is Data Compliance Equal to Data Security?

Is Data Compliance Equal to Data Security?

Comforte AG’s Jonathan Deveaux stresses that while compliance with the GDPR is a worthy goal, adhering to the regulation doesn’t necessarily mean your organization is safe. Consider both compliance and security a journey, not a destination. The European...
Liar, Liar, Pants on Fyre

Liar, Liar, Pants on Fyre

The failed Fyre Festival of 2017 serves as a cautionary tale to any who’d ignore warnings from trusted advisers and key stakeholders. Sandra Erez discusses how the Fyre Festival went so disastrously wrong – and the lesson compliance practitioners should...
What will your headline be?

What will your headline be?

Information travels more quickly than ever. If a disaster occurs in your community, you will need to work quickly and decisively to ensure that the information that gets to the public is accurate, balanced and useful to the people who need it most. Good crisis...
The Future of Work According to Slack

The Future of Work According to Slack

Slack, the cloud-based set of collaborative tools for teams, is taking over, and changing the way we work for good. Here’s what co-founder Stewart Butterfield has to say about the workplace of the future Haven’t you heard? Email is dead. At least,...
Could a Three‑day Work Week Really Work?

Could a Three‑day Work Week Really Work?

With famous CEOs and big-name proponents of a shorter working week getting their voices heard, Ben Hammersley finds out whether more time out of the office – with the same amount of work to do – really can be achieved On the face of it, it’s kind of...
Dow Jones Leak Exposes Watchlist Database

Dow Jones Leak Exposes Watchlist Database

The Watchlist, which contained the identities of government officials, politicians, and people of political interest, is used to identify risk when researching someone. A data leak at Dow Jones exposed the financial firm’s Watchlist database, which contains...