Paul Kirvan Independent IT consultant/auditor Search Disaster Recovery Risk assessment matrix: Free template and usage guide 20 Oct 2023 Search ITOperations site reliability engineering (SRE) 19 Oct 2023 Search Security antispoofing 18 Oct 2023 Search CIO 7 risk mitigation strategies to protect business operations 18 Oct 2023 Search Security Cybersecurity vs. cyber resilience: What's the difference? 18 Oct 2023 Search Security How to conduct a cyber-resilience assessment 17 Oct 2023 Search Security Build a strong cyber-resilience strategy with existing tools 16 Oct 2023 Search CIO Build a digital transformation roadmap in 6 steps 11 Oct 2023 Search Disaster Recovery Business continuity maturity model: An at-a-glance guide 06 Oct 2023 Search Security Using the FAIR model to quantify cyber-risk 03 Oct 2023 Search Security governance, risk and compliance (GRC) 21 Sep 2023 Search Storage 4 reasons cloud data repatriation is happening in storage 20 Sep 2023 Search Security How to remove ransomware, step by step 19 Sep 2023 Search CIO key risk indicator (KRI) 08 Sep 2023 Search CIO IT controls 31 Aug 2023 Search CIO IT audit (information technology audit) 29 Aug 2023 Search CIO change request 29 Aug 2023 Search CIO ISACA 28 Aug 2023 Search CIO deputy CIO (deputy chief information officer) 28 Aug 2023 Search Networking How to modernize networks with sustainability in mind 25 Aug 2023 Search Security How to create a ransomware incident response plan 14 Aug 2023 Search CIO change management strategy 01 Aug 2023 Search Disaster Recovery 6 ways to support business resilience at your organization 31 Jul 2023 Search Security Improve IAM with identity threat detection and response 28 Jul 2023 Search Storage Evaluate object storage advantages and disadvantages 25 Jul 2023 Search Mobile Computing notebook computer 07 Jul 2023 WhatIs network intrusion protection system (NIPS) 07 Jul 2023 Search Disaster Recovery How often should you review a business continuity plan? 05 Jul 2023 Search Cloud Computing Microsoft Azure Functions 30 Jun 2023 Search Mobile Computing wireless ISP (wireless Internet service provider or WISP) 30 Jun 2023 Search Security security token 30 Jun 2023 Search Enterprise Desktop Microsoft Windows File Explorer 30 Jun 2023 WhatIs Macintosh 29 Jun 2023 Search Networking loose coupling 28 Jun 2023 Search Security Top 10 threat modeling tools, plus features to look for 23 Jun 2023 Search Mobile Computing uplink and downlink 21 Jun 2023 Search Storage write endurance 09 Jun 2023 Search Storage SSD form factor 09 Jun 2023 Search Enterprise Desktop desktop 02 Jun 2023 WhatIs ISO 14000 and 14001 02 Jun 2023 Search Unified Communications incumbent local exchange carrier (ILEC) 30 May 2023 Search Networking CSU/DSU (Channel Service Unit/Data Service Unit) 25 May 2023 Search Security How to conduct a smart contract audit and why it's needed 25 May 2023 Search Networking data streaming 24 May 2023 Search Networking operational support system (OSS) 12 May 2023 WhatIs standardization 09 May 2023 Search Disaster Recovery 10 game-changing disaster recovery trends 09 May 2023 Search Data Backup What are best practices for backup cloud repatriation? 08 May 2023 WhatIs serial communications interface (SCI) 05 May 2023 Search Disaster Recovery 10 disaster recovery questions to ask in 2023 and beyond 28 Apr 2023 Search Disaster Recovery 12 business continuity trends to keep an eye on 28 Apr 2023 Search Networking fax 28 Apr 2023 Search Cloud Computing Cloud Foundry 25 Apr 2023 Search Networking collision in networking 24 Apr 2023 Search ITOperations systems operator (sysop) 24 Apr 2023 Search Data Center Energy Star 24 Apr 2023 Search Networking baseband 21 Apr 2023 Search Storage What are 5 top cloud data storage risks? 21 Apr 2023 Search Networking broadband 20 Apr 2023 Search Security How to prepare for a cybersecurity audit 19 Apr 2023 Search Data Center LEED (Leadership in Energy and Environmental Design) 19 Apr 2023 Search Cloud Computing TOSCA (Topology and Orchestration Specification for Cloud Applications) 17 Apr 2023 Search Cloud Computing Red Hat OpenShift 17 Apr 2023 Search Mobile Computing smartphone 17 Apr 2023 Search Storage What the new LTO roadmap means for tape storage 14 Apr 2023 Search ERP prototype 13 Apr 2023 Search Data Center mainframe (big iron) 12 Apr 2023 Search Security How to use a CASB to manage shadow IT 12 Apr 2023 WhatIs operational-level agreement (OLA) 11 Apr 2023 Search Cloud Computing Azure Migrate 11 Apr 2023 WhatIs HDTV (high-definition television) 11 Apr 2023 Search Customer Experience Oracle Customer Experience Cloud (Oracle CX Cloud) 11 Apr 2023 Search Cloud Computing Azure Container Instances (ACI) 10 Apr 2023 Search CIO Agile Manifesto 06 Apr 2023 WhatIs control system 31 Mar 2023 WhatIs pounds per square inch (PSI) 30 Mar 2023 WhatIs microtrend 29 Mar 2023 WhatIs reliability of computers 28 Mar 2023 WhatIs electrostatic discharge (ESD) 27 Mar 2023 WhatIs triage in IT 27 Mar 2023 WhatIs forensic image 23 Mar 2023 WhatIs project constraint 23 Mar 2023 Search Storage How to optimize data storage governance 28 Feb 2023 WhatIs employee productivity 27 Feb 2023 WhatIs vCard 27 Feb 2023 WhatIs memory dump 24 Feb 2023 WhatIs superconductivity 24 Feb 2023 WhatIs controller (computing) 24 Feb 2023 Search Data Backup What are the pros and cons of cloud backup? 06 Feb 2023 Search Storage How can users securely access Google Cloud Storage? 03 Feb 2023 Search Disaster Recovery Fine-tune a social media emergency plan with ISO 22329:2021 31 Jan 2023 Search Security How to select a security analytics platform, plus vendor options 20 Jan 2023 Search Networking green networking 18 Jan 2023 Search Disaster Recovery Developing an emergency communications plan: A template for business continuity professionals 18 Jan 2023 Search Disaster Recovery Why BCDR teams should consider EMP disaster recovery plans 29 Dec 2022 WhatIs stateless app 16 Dec 2022 WhatIs thyristor 16 Dec 2022 Search Networking Ensure network resilience in a network disaster recovery plan 09 Dec 2022 WhatIs vector 07 Dec 2022 WhatIs widget 16 Nov 2022 1 2 3 4 5 6