Paul Kirvan Independent IT consultant/auditor Search Storage Best practices for cloud storage optimization vs. repatriation 01 Apr 2024 Search Data Backup 11 core elements of a successful data protection strategy 28 Mar 2024 Search Networking How to handle environmental regulations and green networking 28 Mar 2024 Search Data Center data center services 28 Mar 2024 Search Disaster Recovery change control 27 Mar 2024 Search Storage RAID 3 (redundant array of independent disks 3) 27 Mar 2024 Search CIO IT project management 26 Mar 2024 Search CIO chief financial officer (CFO) 22 Mar 2024 Search Security Data protection impact assessment template and tips 22 Mar 2024 Search CIO chief strategy officer (CSO) 22 Mar 2024 Search Data Backup removable media 20 Mar 2024 Search ERP warehouse management system (WMS) 19 Mar 2024 Search Storage RAID 50 (RAID 5+0) 19 Mar 2024 Search Data Backup off-site backup 19 Mar 2024 Search Software Quality low-code and no-code development platforms 15 Mar 2024 Search ITChannel service-level agreement (SLA) 15 Mar 2024 Search ERP transportation management system (TMS) 15 Mar 2024 Search CIO Practical strategies for shadow IT management 14 Mar 2024 Search Security How to craft a generative AI security policy that works 14 Mar 2024 Search CIO 17 potential costs of shadow IT 13 Mar 2024 Search ERP supplier relationship management (SRM) 13 Mar 2024 Search Storage How can AI help cloud storage security? 07 Mar 2024 Search Storage storage security 07 Mar 2024 Search Cloud Computing cloud audit 04 Mar 2024 Search Storage RPO vs. RTO: Key differences explained with examples, tips 01 Mar 2024 Search Data Backup Optimize data protection as a service with these essential tips 22 Feb 2024 Search Disaster Recovery Free business continuity testing template for IT pros 21 Feb 2024 Search ITOperations hypervisor 20 Feb 2024 Search Networking A network compliance checklist for remote work 20 Feb 2024 Search Networking firewall as a service (FWaaS) 15 Feb 2024 Search Security How to conduct a social engineering penetration test 13 Feb 2024 Search ITChannel RMM software (remote monitoring and management software) 13 Feb 2024 Search CIO 8 dangers of shadow IT and how to manage them 06 Feb 2024 WhatIs API gateway (application programming interface gateway) 06 Feb 2024 Search Security communications security (COMSEC) 02 Feb 2024 Search Security security operations center (SOC) 31 Jan 2024 Search Disaster Recovery What is the link between sustainability and business continuity? 23 Jan 2024 Search Security Top incident response service providers, vendors and software 23 Jan 2024 Search Storage Why object storage for AI makes sense 18 Jan 2024 Search Security How to conduct incident response tabletop exercises 17 Jan 2024 Search Data Backup hybrid backup 17 Jan 2024 Search Data Center colocation (colo) 03 Jan 2024 Search Data Center configuration management database (CMDB) 03 Jan 2024 Search Storage Fibre Channel over Ethernet (FCoE) 02 Jan 2024 Search Data Backup data protection management (DPM) 02 Jan 2024 Search Disaster Recovery The emerging role of the chief resilience officer in BCDR 21 Dec 2023 Search Software Quality citizen development 06 Dec 2023 WhatIs greenhouse gas 04 Dec 2023 Search Disaster Recovery High availability and resiliency: A DR strategy needs both 30 Nov 2023 WhatIs wiretapping 30 Nov 2023 WhatIs endpoint device 29 Nov 2023 Search Disaster Recovery Build and maintain digital resilience for a stronger DR program 29 Nov 2023 WhatIs data sovereignty 28 Nov 2023 SearchWindows Server client-server network 03 Nov 2023 Search Mobile Computing Wi-Fi (802.11x standard) 03 Nov 2023 WhatIs end of life (EOL) 01 Nov 2023 Search Security ISO 27002 (International Organization for Standardization 27002) 30 Oct 2023 Search Security Top 12 IT security frameworks and standards explained 27 Oct 2023 Search Security How to create a company password policy, with template 26 Oct 2023 Search Storage 10 data storage questions for enterprises to ask 23 Oct 2023 Search Security soft token 20 Oct 2023 Search Disaster Recovery Risk assessment matrix: Free template and usage guide 20 Oct 2023 Search ITOperations site reliability engineering (SRE) 19 Oct 2023 Search Security antispoofing 18 Oct 2023 Search CIO 7 risk mitigation strategies to protect business operations 18 Oct 2023 Search Security Cybersecurity vs. cyber resilience: What's the difference? 18 Oct 2023 Search Security How to conduct a cyber-resilience assessment 17 Oct 2023 Search Security Build a strong cyber-resilience strategy with existing tools 16 Oct 2023 Search CIO Build a digital transformation roadmap in 6 steps 11 Oct 2023 Search Disaster Recovery Business continuity maturity model: An at-a-glance guide 06 Oct 2023 Search Security Using the FAIR model to quantify cyber-risk 03 Oct 2023 Search Security governance, risk and compliance (GRC) 21 Sep 2023 Search Storage 4 reasons cloud data repatriation is happening in storage 20 Sep 2023 Search Security How to remove ransomware, step by step 19 Sep 2023 Search CIO key risk indicator (KRI) 08 Sep 2023 Search CIO IT controls 31 Aug 2023 Search CIO IT audit (information technology audit) 29 Aug 2023 Search CIO change request 29 Aug 2023 Search CIO ISACA 28 Aug 2023 Search CIO deputy CIO (deputy chief information officer) 28 Aug 2023 Search Networking How to modernize networks with sustainability in mind 25 Aug 2023 Search Security How to create a ransomware incident response plan 14 Aug 2023 Search CIO change management strategy 01 Aug 2023 Search Disaster Recovery 6 ways to support business resilience at your organization 31 Jul 2023 Search Security Improve IAM with identity threat detection and response 28 Jul 2023 Search Storage Evaluate object storage advantages and disadvantages 25 Jul 2023 Search Mobile Computing notebook computer 07 Jul 2023 WhatIs network intrusion protection system (NIPS) 07 Jul 2023 Search Disaster Recovery How often should you review a business continuity plan? 05 Jul 2023 Search Cloud Computing Microsoft Azure Functions 30 Jun 2023 Search Mobile Computing wireless ISP (wireless Internet service provider or WISP) 30 Jun 2023 Search Security security token 30 Jun 2023 Search Enterprise Desktop Microsoft Windows File Explorer 30 Jun 2023 WhatIs Macintosh 29 Jun 2023 Search Networking loose coupling 28 Jun 2023 Search Security Top 10 threat modeling tools, plus features to look for 23 Jun 2023 Search Mobile Computing uplink and downlink 21 Jun 2023 Search Storage write endurance 09 Jun 2023 Search Storage SSD form factor 09 Jun 2023 Search Enterprise Desktop desktop 02 Jun 2023 1 2 3 4 5 6