As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

FEMA Supply Chain Resilience Guide

FEMA Supply Chain Resilience Guide

Strategic Overview Disasters disrupt preexisting networks of demand and supply. Quickly reestablishing flows of water, food, pharmaceuticals, medical goods, fuel, and other crucial commodities is almost always in the immediate interest of survivors and longer-term...
ALL ABOUT PANDEMIC CATASTROPHE BONDS

ALL ABOUT PANDEMIC CATASTROPHE BONDS

In previous articles, we discussed how communicable diseases and pandemics are (or are not) addressed in personal and commercialinsurance policies. Today, we’ll talk about pandemic catastrophe bonds. The Ebola outbreak between 2014 and...
How to Build a Cloud Security Model

How to Build a Cloud Security Model

More and more businesses are deploying applications, operations, and infrastructure to cloud environments – but many don’t take the necessary steps to properly operate and secure it. “It’s not impossible to securely operate in a single-cloud or...
IT’S SAFE TO WORK IN (NOT ON) MARIJUANA

IT’S SAFE TO WORK IN (NOT ON) MARIJUANA

There’s a pervasive myth out there that the marijuana industry is an unregulated Wild West populated by desperadoes and mountebanks out to score a quick buck. But even a passing familiarity with how the industry operates in states with legal recreational and...
Lessons from a Ransomware Attack

Lessons from a Ransomware Attack

In the wake of a reported ransomware attack on global manufacturing firm Aebi Schmidt, Peter Groucutt outlines the steps companies should take to prepare for such incidents. A clear cyber incident response plan and maintaining frequent communication are critical. The...
5 Security Challenges to API Protection

5 Security Challenges to API Protection

Today’s application programming interfaces are no longer simple or front-facing, creating new risks for both security and DevOps All APIs are different inside, even if they’re using similar frameworks and architectures, such as REST. Under whatever...
The Hiscox Cyber Readiness Report 2019

The Hiscox Cyber Readiness Report 2019

Rising to the cyber challenge Our third Hiscox Cyber Readiness Report provides you with an up-to-the-minute picture of the cyber readiness of organisations, as well as a blueprint for best practice in the fight to counter the ever-evolving cyber threat. Barely a week...
When Every Attack Is a Zero Day

When Every Attack Is a Zero Day

Stopping malware the first time is an ideal that has remained tantalizingly out of reach. But automation, artificial intelligence, and deep learning are poised to change that. The collective efforts of hackers have fundamentally changed the cyber defense game. Today,...
Understanding The Evolving DRP Market

Understanding The Evolving DRP Market

Sixty-four percent of global security decision makers recognize that improving their threat intelligence capabilities is a high or critical priority. Nevertheless, companies across many industries fail to develop a strategy for achieving this. Among the many reasons...
The Cybersecurity Automation Paradox

The Cybersecurity Automation Paradox

Recent studies show that before automation can reduce the burden on understaffed cybersecurity teams, they need to bring in enough automation skills to run the tools. Cybersecurity organizations face a chicken-and-egg conundrum when it comes to automation and the...
Career Spotlight – Mark Kern

Career Spotlight – Mark Kern

EDITOR’S NOTE: The DRJ Career Development Committee is supporting this series of articles featuring the career paths of industry professionals. Throughout this series of candid interviews, we hope to provide career advice to our readers by highlighting lessons...
Playing Hardball

Playing Hardball

Consider the following: Baseball is the only team sport where the defense has control of the ball. The side currently in offense does not handle the ball as they would in any other sport. A player does not score in baseball by bringing the ball to the finish line or...
What is Compliance SME?

What is Compliance SME?

Donna Boehme, the “Lion of Compliance” shares that true compliance SME is the first and most foundational element of a strong compliance program. An experienced CCO with true compliance SME earned in the field and in the profession understands on many...
Merging Companies, Merging Clouds

Merging Companies, Merging Clouds

Integrating cloud environments is anything but easy. Evaluating the security risks in doing so must be a starting component of an overall M&A strategy. Mergers and acquisitions are an essential part of the enterprise business landscape. These deals foster...
Ignore the Insider Threat at Your Peril

Ignore the Insider Threat at Your Peril

Attacks from insiders often go undiscovered for months or years, so the potential impact can be huge. These 11 countermeasures can mitigate the damage. The fear of cyber breaches looms heavy for many businesses, large and small. However, many companies are so busy...
True Cybersecurity Means a Proactive Response

True Cybersecurity Means a Proactive Response

Successful, secure organizations must take an aggressive, pre-emptive posture if they want true data security Cybercriminals are always works in progress. Their knowledge and ability to bypass security systems are constantly advancing. As they gain knowledge, they...
INSURANCE CAN GET WEIRD

INSURANCE CAN GET WEIRD

Yesterday’s post about insurance-related Guinness World Recordsgot me thinking: what other weird insurance policies are out there? If you know much about insurance, you know that the first place to inquire about weird insurance policies is Lloyd’s of...
In Security, Programmers Aren’t Perfect

In Security, Programmers Aren’t Perfect

Software developers and their managers must change their perception of secure coding from being an optional feature to being a requirement that is factored into design from the beginning Fifth in a continuing series about the human element in cybersecurity....
Breaking Up is Hard to Do

Breaking Up is Hard to Do

Breaking up is hard to do.  Those are not my words.  They were said, or sang by a much more talented guy named Neal Sedaka.  He sang those lyrics back in 1976, but they are still true today.  Breaking up is hard to do.  You can watch a...
If You Can’t Beat ‘Em, Buy ‘Em

If You Can’t Beat ‘Em, Buy ‘Em

The lines between agencies, consultancies, and tech services firms are continuing to blur. This convergence is driven in part by an acquisition-heavy strategy. Like in 2017, the last year of acquisitions saw cloud and agency capabilities as most in demand. But what...
Backup – is your strategy evolving?

Backup – is your strategy evolving?

It goes without saying that backing up data is one of the most important things a business can do, especially considering how data is now essentially the lifeblood of an organization. With this in mind, five IT industry professionals give their advice as to how...