As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

HAVE A DISASTER PLAN FOR YOUR SMALL BUSINESS

HAVE A DISASTER PLAN FOR YOUR SMALL BUSINESS

Owning a small business has many rewards, like freedom, independence and the chance to financially benefit from your own hard work.  But there are also major challenges, like long hours, hungry competitors, and cash-flow problems. One of the challenges that lands...
Challenges Facing Emergency Managers Today

Challenges Facing Emergency Managers Today

By its very definition, emergency management is a field that deals constantly with challenges. Back in 2005, we co-authored an article that examined some specific “critical obstacles” facing emergency managers at the time, including: an imbalance of focus...
What is IT Disaster Recovery?

What is IT Disaster Recovery?

Disaster recovery is an important process within business continuity management (BCM) that focuses on developing a plan of action to recover from a potential internal or external business threat. In other words, disaster recovery is about ensuring that the business...
How Can You Mitigate Risk On Your Phone?

How Can You Mitigate Risk On Your Phone?

Do we understand how to avoid the risk of our devices being compromised? For most of us, our mobile phones are an extension of ourselves. Our daily routine, interests, personality and vital information are all stored on devices that we take with us on-the-go to assist...
INSURANCE PROTECTION FOR A RAINY DAY

INSURANCE PROTECTION FOR A RAINY DAY

June weather in New York City can be fickle. As the I.I.I.’s own Brent Carris reported, this fickleness can lead to chaos for the city’s outdoor music festivals, like the recent fiasco at this year’s Gov Ball. Carris noted that event organizers...
No Elevators

No Elevators

“There is no elevator to success. You have to take the stairs.”  ~ Bit of wisdom on stairway outside a high-intensity gym Life ain’t easy. Neither is a job. That’s why they call it work. It’s true of every aspect of personal life and...
Forrester’s Guide To Paying Ransomware

Forrester’s Guide To Paying Ransomware

Paying Ransom Can Be A Valid Recovery Option Based On Business Need And Circumstances Why Read This Report Conventional wisdom says that when your company suffers a ransomware attack, you should never pay the ransom. But hardline conversations about whether to...
The CISO’s Drive to Consolidation

The CISO’s Drive to Consolidation

Cutting back on the number of security tools you’re using can save money and leave you safer. Here’s how to get started.   Industry reports vary, but experts estimate that the modern CISO uses somewhere between 55 and 75 discrete security products....
Predicting Vulnerability Weaponization

Predicting Vulnerability Weaponization

Advances in data science are making it possible to shift vulnerability management from a reactive to a proactive discipline   Keeping pace with the endless deluge of security vulnerabilities has become one of the truly Sisyphean tasks for enterprise IT...
FBI Warns of Dangers in ‘Safe’ Websites

FBI Warns of Dangers in ‘Safe’ Websites

Criminals are using TLS certificates to convince users that fraudulent sites are worthy of their trust   One of the most common mechanisms used to secure web browser sessions — and to assure consumers that their transactions are secure — is also being...
What is an IT Disaster Recovery, RPO and RTO?

What is an IT Disaster Recovery, RPO and RTO?

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are essential to the success of any business continuity program. With a wide range of potential business interruptions, RTO and RPO are two of the most critical factors of a disaster recovery or data...
Federal Photos Filched in Contractor Breach

Federal Photos Filched in Contractor Breach

Data should never have been on subcontractor’s servers, says Customs and Border Protection.   Photos used by US Customs and Border Protection (CBP) in an effort to protect travelers have been taken in an attack against a federal subcontractor. Officials...
ISO: The new dawn of disease control

ISO: The new dawn of disease control

In our evermore complex, interconnected world, with health systems undergoing new challenges and stresses, risk management in the healthcare industry has never been more important. Three ISO standards play a significant role in matching clinical quality with...
CISOs & CIOs: Better Together

CISOs & CIOs: Better Together

An overview of three common organizational structures illustrates how NOT to pit chief security and IT execs against each other.   For certain critical IT deliverables, CIOs and CISOs embody the inherent tension between cybersecurity and operational requirements....
What Cyber Skills Shortage?

What Cyber Skills Shortage?

Employers can solve the skills gap by first recognizing that there isn’t an archetypal “cybersecurity job” in the same way that there isn’t an archetypal “automotive job.” Here’s how.   It feels like every day,...
How to get the most from your team

How to get the most from your team

Any business serious about building a successful future needs to meet its employees’ demands for flexibility   The fact that the work landscape is evolving at a rate of knots won’t have escaped your notice. The very idea that we should work 9 to 6,...