Paul Kirvan Independent IT consultant/auditor Data Backup off-site backup 19 Mar 2024 Software Quality low-code and no-code development platforms 15 Mar 2024 ITChannel service-level agreement (SLA) 15 Mar 2024 ERP transportation management system (TMS) 15 Mar 2024 CIO Practical strategies for shadow IT management 14 Mar 2024 Security How to craft a generative AI security policy that works 14 Mar 2024 CIO 17 potential costs of shadow IT 13 Mar 2024 ERP supplier relationship management (SRM) 13 Mar 2024 Storage How can AI help cloud storage security? 07 Mar 2024 Storage storage security 07 Mar 2024 Cloud Computing cloud audit 04 Mar 2024 Storage RPO vs. RTO: Key differences explained with examples, tips 01 Mar 2024 Data Backup Optimize data protection as a service with these essential tips 22 Feb 2024 Disaster Recovery Free business continuity testing template for IT pros 21 Feb 2024 ITOperations hypervisor 20 Feb 2024 Networking A network compliance checklist for remote work 20 Feb 2024 Networking firewall as a service (FWaaS) 15 Feb 2024 Security How to conduct a social engineering penetration test 13 Feb 2024 ITChannel RMM software (remote monitoring and management software) 13 Feb 2024 CIO 8 dangers of shadow IT and how to manage them 06 Feb 2024 WhatIs API gateway (application programming interface gateway) 06 Feb 2024 Security communications security (COMSEC) 02 Feb 2024 Security security operations center (SOC) 31 Jan 2024 Disaster Recovery What is the link between sustainability and business continuity? 23 Jan 2024 Security Top incident response service providers, vendors and software 23 Jan 2024 Storage Why object storage for AI makes sense 18 Jan 2024 Security How to conduct incident response tabletop exercises 17 Jan 2024 Data Backup hybrid backup 17 Jan 2024 Data Center configuration management database (CMDB) 03 Jan 2024 Data Center colocation (colo) 03 Jan 2024 Storage Fibre Channel over Ethernet (FCoE) 02 Jan 2024 Data Backup data protection management (DPM) 02 Jan 2024 Disaster Recovery The emerging role of the chief resilience officer in BCDR 21 Dec 2023 Software Quality citizen development 06 Dec 2023 WhatIs greenhouse gas 04 Dec 2023 Disaster Recovery High availability and resiliency: A DR strategy needs both 30 Nov 2023 WhatIs wiretapping 30 Nov 2023 WhatIs endpoint device 29 Nov 2023 Disaster Recovery Build and maintain digital resilience for a stronger DR program 29 Nov 2023 WhatIs data sovereignty 28 Nov 2023 SearchWindowsServer client-server network 03 Nov 2023 Mobile Computing Wi-Fi (802.11x standard) 03 Nov 2023 WhatIs end of life (EOL) 01 Nov 2023 Security ISO 27002 (International Organization for Standardization 27002) 30 Oct 2023 Security Top 12 IT security frameworks and standards explained 27 Oct 2023 Security How to create a company password policy, with template 26 Oct 2023 Storage 10 data storage questions for enterprises to ask 23 Oct 2023 Security soft token 20 Oct 2023 Disaster Recovery Risk assessment matrix: Free template and usage guide 20 Oct 2023 ITOperations site reliability engineering (SRE) 19 Oct 2023 Security antispoofing 18 Oct 2023 CIO 7 risk mitigation strategies to protect business operations 18 Oct 2023 Security Cybersecurity vs. cyber resilience: What's the difference? 18 Oct 2023 Security How to conduct a cyber-resilience assessment 17 Oct 2023 Security Build a strong cyber-resilience strategy with existing tools 16 Oct 2023 CIO Build a digital transformation roadmap in 6 steps 11 Oct 2023 Disaster Recovery Business continuity maturity model: An at-a-glance guide 06 Oct 2023 Security Using the FAIR model to quantify cyber-risk 03 Oct 2023 Security governance, risk and compliance (GRC) 21 Sep 2023 Storage 4 reasons cloud data repatriation is happening in storage 20 Sep 2023 Security How to remove ransomware, step by step 19 Sep 2023 CIO key risk indicator (KRI) 08 Sep 2023 CIO IT controls 31 Aug 2023 CIO IT audit (information technology audit) 29 Aug 2023 CIO change request 29 Aug 2023 CIO ISACA 28 Aug 2023 CIO deputy CIO (deputy chief information officer) 28 Aug 2023 Networking How to modernize networks with sustainability in mind 25 Aug 2023 Security How to create a ransomware incident response plan 14 Aug 2023 CIO change management strategy 01 Aug 2023 Disaster Recovery 6 ways to support business resilience at your organization 31 Jul 2023 Security Improve IAM with identity threat detection and response 28 Jul 2023 Storage Evaluate object storage advantages and disadvantages 25 Jul 2023 Mobile Computing notebook computer 07 Jul 2023 WhatIs network intrusion protection system (NIPS) 07 Jul 2023 Disaster Recovery How often should you review a business continuity plan? 05 Jul 2023 Cloud Computing Microsoft Azure Functions 30 Jun 2023 Mobile Computing wireless ISP (wireless Internet service provider or WISP) 30 Jun 2023 Security security token 30 Jun 2023 Enterprise Desktop Microsoft Windows File Explorer 30 Jun 2023 WhatIs Macintosh 29 Jun 2023 Networking loose coupling 28 Jun 2023 Security Top 10 threat modeling tools, plus features to look for 23 Jun 2023 Mobile Computing uplink and downlink 21 Jun 2023 Storage write endurance 09 Jun 2023 Storage SSD form factor 09 Jun 2023 Enterprise Desktop desktop 02 Jun 2023 WhatIs ISO 14000 and 14001 02 Jun 2023 Unified Communications incumbent local exchange carrier (ILEC) 30 May 2023 Networking CSU/DSU (Channel Service Unit/Data Service Unit) 25 May 2023 Security How to conduct a smart contract audit and why it's needed 25 May 2023 Networking data streaming 24 May 2023 Networking operational support system (OSS) 12 May 2023 WhatIs standardization 09 May 2023 Disaster Recovery 10 game-changing disaster recovery trends 09 May 2023 Data Backup What are best practices for backup cloud repatriation? 08 May 2023 WhatIs serial communications interface (SCI) 05 May 2023 Disaster Recovery 10 disaster recovery questions to ask in 2023 and beyond 28 Apr 2023 Disaster Recovery 12 business continuity trends to keep an eye on 28 Apr 2023 Networking fax 28 Apr 2023 1 2 3 4 5 6