Paul Kirvan Independent IT consultant/auditor Disaster Recovery High availability and resiliency: A DR strategy needs both 30 Nov 2023 WhatIs wiretapping 30 Nov 2023 WhatIs endpoint device 29 Nov 2023 Disaster Recovery Build and maintain digital resilience for a stronger DR program 29 Nov 2023 WhatIs data sovereignty 28 Nov 2023 SearchWindowsServer client-server network 03 Nov 2023 Mobile Computing Wi-Fi (802.11x standard) 03 Nov 2023 WhatIs end of life (EOL) 01 Nov 2023 Security ISO 27002 (International Organization for Standardization 27002) 30 Oct 2023 Security Top 12 IT security frameworks and standards explained 27 Oct 2023 Security How to create a company password policy, with template 26 Oct 2023 Storage 10 data storage questions for enterprises to ask 23 Oct 2023 Security soft token 20 Oct 2023 Disaster Recovery Risk assessment matrix: Free template and usage guide 20 Oct 2023 ITOperations site reliability engineering (SRE) 19 Oct 2023 Security antispoofing 18 Oct 2023 CIO 7 risk mitigation strategies to protect business operations 18 Oct 2023 Security Cybersecurity vs. cyber resilience: What's the difference? 18 Oct 2023 Security How to conduct a cyber-resilience assessment 17 Oct 2023 Security Build a strong cyber-resilience strategy with existing tools 16 Oct 2023 CIO Build a digital transformation roadmap in 6 steps 11 Oct 2023 Disaster Recovery Business continuity maturity model: An at-a-glance guide 06 Oct 2023 Security Using the FAIR model to quantify cyber-risk 03 Oct 2023 Security governance, risk and compliance (GRC) 21 Sep 2023 Storage 4 reasons cloud data repatriation is happening in storage 20 Sep 2023 Security How to remove ransomware, step by step 19 Sep 2023 CIO learning management system (LMS) 08 Sep 2023 CIO key risk indicator (KRI) 08 Sep 2023 CIO IT controls 31 Aug 2023 CIO IT audit (information technology audit) 29 Aug 2023 CIO change request 29 Aug 2023 CIO ISACA 28 Aug 2023 CIO deputy CIO (deputy chief information officer) 28 Aug 2023 Networking How to modernize networks with sustainability in mind 25 Aug 2023 Security How to create a ransomware incident response plan 14 Aug 2023 CIO change management strategy 01 Aug 2023 Disaster Recovery 6 ways to support business resilience at your organization 31 Jul 2023 Security Improve IAM with identity threat detection and response 28 Jul 2023 Storage Evaluate object storage advantages and disadvantages 25 Jul 2023 Mobile Computing notebook computer 07 Jul 2023 WhatIs network intrusion protection system (NIPS) 07 Jul 2023 Disaster Recovery How often should you review a business continuity plan? 05 Jul 2023 Content Management records retention schedule 05 Jul 2023 Content Management records management 30 Jun 2023 Cloud Computing Microsoft Azure Functions 30 Jun 2023 Mobile Computing wireless ISP (wireless Internet service provider or WISP) 30 Jun 2023 Security security token 30 Jun 2023 Enterprise Desktop Microsoft Windows File Explorer 30 Jun 2023 WhatIs Macintosh 29 Jun 2023 Networking loose coupling 28 Jun 2023 Security Top 10 threat modeling tools, plus features to look for 23 Jun 2023 Mobile Computing uplink and downlink 21 Jun 2023 Storage write endurance 09 Jun 2023 Storage SSD form factor 09 Jun 2023 Enterprise Desktop desktop 02 Jun 2023 WhatIs ISO 14000 and 14001 02 Jun 2023 Unified Communications incumbent local exchange carrier (ILEC) 30 May 2023 Networking CSU/DSU (Channel Service Unit/Data Service Unit) 25 May 2023 Security How to conduct a smart contract audit and why it's needed 25 May 2023 Networking data streaming 24 May 2023 Content Management information rights management (IRM) 23 May 2023 Networking operational support system (OSS) 12 May 2023 WhatIs standardization 09 May 2023 Disaster Recovery 10 game-changing disaster recovery trends 09 May 2023 Data Backup What are best practices for backup cloud repatriation? 08 May 2023 WhatIs serial communications interface (SCI) 05 May 2023 Disaster Recovery 10 disaster recovery questions to ask in 2023 and beyond 28 Apr 2023 Disaster Recovery 12 business continuity trends to keep an eye on 28 Apr 2023 Networking fax 28 Apr 2023 WhatIs reliability, availability and serviceability (RAS) 27 Apr 2023 Cloud Computing Cloud Foundry 25 Apr 2023 Networking collision in networking 24 Apr 2023 Customer Experience Salesforce Service Cloud 24 Apr 2023 ITOperations systems operator (sysop) 24 Apr 2023 Data Center Energy Star 24 Apr 2023 Networking baseband 21 Apr 2023 Storage What are 5 top cloud data storage risks? 21 Apr 2023 Networking broadband 20 Apr 2023 Security How to prepare for a cybersecurity audit 19 Apr 2023 Data Center LEED (Leadership in Energy and Environmental Design) 19 Apr 2023 Cloud Computing TOSCA (Topology and Orchestration Specification for Cloud Applications) 17 Apr 2023 Cloud Computing Red Hat OpenShift 17 Apr 2023 Mobile Computing smartphone 17 Apr 2023 Storage What the new LTO roadmap means for tape storage 14 Apr 2023 ERP prototype 13 Apr 2023 Data Center mainframe (big iron) 12 Apr 2023 Security How to use a CASB to manage shadow IT 12 Apr 2023 WhatIs operational-level agreement (OLA) 11 Apr 2023 Cloud Computing Azure Migrate 11 Apr 2023 WhatIs HDTV (high-definition television) 11 Apr 2023 WhatIs word (in computing) 11 Apr 2023 Customer Experience Oracle Customer Experience Cloud (Oracle CX Cloud) 11 Apr 2023 Networking Is cloud-based network management right for your business? 10 Apr 2023 Cloud Computing Azure Container Instances (ACI) 10 Apr 2023 CIO Agile Manifesto 06 Apr 2023 WhatIs control system 31 Mar 2023 WhatIs pounds per square inch (PSI) 30 Mar 2023 WhatIs microtrend 29 Mar 2023 WhatIs reliability of computers 28 Mar 2023 WhatIs electrostatic discharge (ESD) 27 Mar 2023 1 2 3 4 5