As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.

Please reset your password to access the new
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In

Create new account
(it's completely free). Subscribe

“Mathias Thurman,” a real security manager whose name and employer has been disguised for obvious reasons, wrote in the May 21 edition of Computerworld [] that an administrator, during a training session with an employee on how to manage the organization’s antivirus infrastructure while reviewing the reports of machines with infected files, spotted what appeared to be a very suspicious file with a “.mov” extension. This particular employee had an MOV file on his G drive with a name that indicated the video potentially involved child pornography. The file was found to be on a device of an employee located…

November 13, 2019 – Staffing the Expertise you need at the Right Time and Cost Flexibility


October 30, 2019 – Orchestrating a Disaster Recovery Test


October 23, 2019 – BCP Software or BCP Consultants? What is best for you?


Three Ways To Achieve True Enterprise Resiliency
When you first get up in the morning, before the first cup of coffee you hear on the radio or...
Why True Enterprise Resiliency is the Responsibility of Top Executives
Congratulations, you have worked hard to reach your current position as a senior executive, so it is only fitting that...
Best Practices for Strategic Records Management
One of the keys to successful and rapid disaster recovery is effective records management. In the past, the records management...
BIA Probably the Most Important Analysis
In difficult times of economic crisis, business continuity management often goes by the wayside, and I don’t think it should....