As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.

Please reset your password to access the new
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In

Create new account
(it's completely free). Subscribe

While hurricanes and tornadoes have been on the front pages lately, your organization might be the victim of an undetectable cyber attack right now. Even if you suspect that you have been hacked, you may not be quite sure what’s been exposed or exfiltrated, or where the attack is coming from. If your first thought is to disconnect the affected systems, you must attend Solutions Track 5 on Sunday afternoon, titled "Will Your BCP Help You Recover from a Cyber Incident?" to find out why doing that could be more dangerous than you could ever imagine. I want to give you some homework before…
Disaster Recovery and Business Continuity in the Workplace
When or if. Much more than simple conjunctions, these two terms represent a widening technology gulf and risk mindset that...
Practice Makes Perfect
I used to do the Telegraph crossword years ago, after my mother-in-law got me into it (one of the two...
Understanding High Availability and Disaster Recovery in Your Overall Recovery Strategy
When developing a disaster recovery strategy, customers frequently ask me to clarify the difference between disaster recovery and high availability....
Think before you buy: 11 considerations to make before purchasing a data protection solution
The term “solution” is not something to use lightly as it refers to a product or set of products that...