As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

WannaCry Lives On in 145K Infected Devices

WannaCry Lives On in 145K Infected Devices

Data from the last half year shows devices worldwide infected with the self-propagating ransomware, putting organizations with poor patching initiatives at risk.   Two years after the WannaCry ransomware attack blitzed through major organizations and shut down...
Cybercrime: Looking Beyond the Dark Web

Cybercrime: Looking Beyond the Dark Web

Fighting cybercrime requires visibility into much more than just the Dark Web. Here’s where to look and a glimpse of what you’ll find. The now-shuttered DeepDotWeb, which was a uniquely centralized and trusted repository of Dark Web links and...
Rethinking Resilience Analytics

Rethinking Resilience Analytics

Abstract The concept of “resilience analytics” has recently been proposed as a means to leverage the promise of big data to improve the resilience of interdependent critical infrastructure systems and the communities supported by them. Given recent...
What Happens When Managers Misbehave?

What Happens When Managers Misbehave?

GRC professionals in particular know the importance of tone at the top. When a leader has an ethical lapse, the ramifications can be far-reaching. Michael Volkov discusses the potential fallout of managerial misdeeds. Company managers are the linchpin of a corporate...
The 3 Cybersecurity Rules of Trust

The 3 Cybersecurity Rules of Trust

Every day, keeping anything secure requires being smart about trust. The rules of trust will keep you and your data safer.   Do you trust me? Why wouldn’t you? I’m honest, have strong credentials in cybersecurity, and helped design security solutions...
GDPR: A Year of Monitoring Data Protection

GDPR: A Year of Monitoring Data Protection

The first anniversary of GDPR is rapidly approaching on May 25. Tech companies used the past year to learn how to navigate the guidelines set in place by the law while ensuring compliance with similar laws globally. After all, for companies who violate GDPR, the legal...
Adaptive BC: Not for Most

Adaptive BC: Not for Most

By Brian Zawada Director of Consulting Services, AvalutionConsulting Adaptive BC has done a great job of stirring up the business continuity profession with some new ideas. At Avalution – we love pushing the envelope and try new things, so we were excited...
Old Threats Are New Again

Old Threats Are New Again

They may look familiar to you, and that isn’t a coincidence. New threats are often just small twists on old ones. Cyberattackers are often thought to be tech experts. Cyberattackers understand security vulnerabilities and loopholes that most people don’t...
Data Security: Think Beyond the Endpoint

Data Security: Think Beyond the Endpoint

A strong data protection strategy is essential as data moves across endpoints and in the cloud  LAS VEGAS – Endpoint security is a common concern among organizations, but security teams should be thinking more broadly about protecting data wherever it...
The Data Problem in Security

The Data Problem in Security

CISOs must consider reputation, resiliency, and regulatory impact to establish their organization’s guidelines around what data matters most. Today’s CIOs are the stewards of company data, responsible for its health and performance as well as maintenance...
Anticipating the Trash Crisis of the Future

Anticipating the Trash Crisis of the Future

What will happen to the plastic bag you threw away with lunch today? Will it sit in a landfill, clog a municipal sanitation system, or end up in your seafood? Concern over this question has helped spur the rise of the new and rapidly growing cultural trend of people...
Who Moved The Communications Services Sector?

Who Moved The Communications Services Sector?

Success in the communications services sector is indeed a capricious piece of cheese. In it, every new technology advancement brings new business models, new security and sociopolitical debates, brand new industries of disruptors, and even new job roles for man and...
Website Attack Attempts Rose by 69% in 2018

Website Attack Attempts Rose by 69% in 2018

Millions of websites have been compromised, but the most likely malware isn’t cyptomining: it’s quietly stealing files and redirecting traffic, a new Sitelock report shows. Websites suffer an average of 62 serious attack threats per day — an average...
Is your crisis management plan good enough?

Is your crisis management plan good enough?

The aftermath of a global corporate scandal is a very messy affair. Firstly, there’s the breaking news, then the media frenzy, the plummeting share price, the evaporating confidence, the damage-limitation exercises and finally the grovelling executives. We live...
Beyond Technology

Beyond Technology

The same disruptive technologies that are changing our lives and revolutionizing virtually every sector of the economy can be used to create a more sustainable world. By setting the standards that frame these initiatives, ISO/TC 207 helps scale solutions to our...
Better Behavior, Better Biometrics?

Better Behavior, Better Biometrics?

Behavioral biometrics is a building block to be used in conjunction with other security measures, but it shows promise. The quest for frictionless yet secure authentication has been the central driver of innovation in identity and access management (IAM) systems for a...
Attackers Add a New Spin to Old Scams

Attackers Add a New Spin to Old Scams

Scammers are figuring out unique ways of abusing cloud services to make their attacks look more genuine, Netskope says. Cybercriminals have begun abusing legitimate cloud services in new ways to try and sneak attacks past security controls and make their scams appear...
Trust the Stack, Not the People

Trust the Stack, Not the People

A completely trusted stack lets the enterprise be confident that apps and data are treated and protected wherever they are.   With great power comes great responsibility. Just ask Spider-Man — or a 20-something system administrator running a...
Study Exposes Breadth of Cyber Risk

Study Exposes Breadth of Cyber Risk

New study shows SMBs face greater security exposure, but large companies still support vulnerable systems as well. Organizations with high-value external hosts are three times more likely to have severe security exposure to vulnerabilities such as outdated...