Paul Kirvan Independent IT consultant/auditor WhatIs polarity 18 Oct 2022 Security An overview of the CISA Zero Trust Maturity Model 12 Oct 2022 Security How to conduct a cybersecurity audit based on zero trust 11 Oct 2022 Networking What to include in a network disaster recovery plan checklist 04 Oct 2022 WhatIs adiabatic cooling 03 Oct 2022 WhatIs logical implication 30 Sep 2022 WhatIs table 30 Sep 2022 WhatIs synchronous/asynchronous API 29 Sep 2022 WhatIs memory management unit (MMU) 29 Sep 2022 WhatIs hue, saturation and brightness 27 Sep 2022 Security 10 PCI DSS best practices to weigh as new standard rolls out 27 Sep 2022 Disaster Recovery Use ISO 22320:2018 to prepare an incident management plan 23 Sep 2022 WhatIs watt-hour (Wh) 22 Sep 2022 WhatIs cluster 19 Sep 2022 Networking Tips to prepare for a network disaster recovery audit 13 Sep 2022 WhatIs CAVE (Cave Automatic Virtual Environment) 13 Sep 2022 WhatIs scale-out storage 12 Sep 2022 Storage Tips to achieve compliance with GDPR in cloud storage 08 Sep 2022 WhatIs customer demographics 01 Sep 2022 WhatIs plotter 01 Sep 2022 Disaster Recovery Use ISO/TS 22317:2021 to shape your business impact analysis 31 Aug 2022 WhatIs apparent power 31 Aug 2022 Storage NAS vs. server: Which storage option should you choose? 29 Aug 2022 Storage Explore software-defined storage pros and cons 26 Aug 2022 Security PCI DSS v4.0 is coming, here's how to prepare to comply 24 Aug 2022 WhatIs critical path method (CPM) 23 Aug 2022 Security 8 secure file transfer services for the enterprise 19 Aug 2022 WhatIs GPS coordinates 18 Aug 2022 Storage Compare software-defined storage vs. storage virtualization 16 Aug 2022 Disaster Recovery Free disaster recovery budget template to justify BCDR spending 15 Aug 2022 Storage Differences in scale-up vs. scale-out storage 02 Aug 2022 Disaster Recovery Use recovery level objective to fine-tune BCDR response 29 Jul 2022 Security How to create a data security policy, with template 21 Jul 2022 Security data compliance 20 Jul 2022 WhatIs six degrees of separation 18 Jul 2022 Storage Key differences in software RAID vs. hardware RAID 13 Jul 2022 WhatIs analog-to-digital conversion (ADC) 13 Jul 2022 Networking BGP vs. EIGRP: What's the difference? 08 Jul 2022 Security How to create a critical infrastructure incident response plan 07 Jul 2022 Storage Key features of a distributed file system 22 Jun 2022 WhatIs computer instruction 15 Jun 2022 WhatIs acceptable use policy (AUP) 13 Jun 2022 WhatIs laser printer 13 Jun 2022 WhatIs motherboard 06 Jun 2022 WhatIs memorandum of understanding (MOU) 02 Jun 2022 WhatIs contingency plan 31 May 2022 WhatIs multithreading 26 May 2022 Disaster Recovery Free business impact analysis (BIA) template with instructions 26 May 2022 Disaster Recovery Business resilience vs. business continuity: Key differences 26 May 2022 Disaster Recovery ITGC audit checklist: 6 controls you need to address 24 May 2022 CIO business resilience 23 May 2022 WhatIs instruction set 23 May 2022 Disaster Recovery A free business continuity plan template and guide 16 May 2022 WhatIs troubleshooting 13 May 2022 Disaster Recovery Top 10 business continuity risks to monitor 10 May 2022 WhatIs command prompt 10 May 2022 Data Center green data center 10 May 2022 Storage What are some tips for storage of sensitive data? 09 May 2022 Security The top secure software development frameworks 09 May 2022 Data Center How much energy do data centers consume? 25 Apr 2022 Storage How can organizations prepare for a data storage audit? 21 Apr 2022 Security Pen testing guide: Types, steps, methodologies and frameworks 07 Apr 2022 Security Open System Authentication (OSA) 07 Apr 2022 Data Center data center resiliency 04 Apr 2022 Disaster Recovery How AI adds value to crisis communications systems 29 Mar 2022 Disaster Recovery How to calculate maximum allowable downtime 28 Mar 2022 Security How to overcome GDPR compliance challenges 24 Mar 2022 Networking application layer 22 Mar 2022 Security mutual authentication 21 Mar 2022 Security How to write an information security policy, plus templates 11 Mar 2022 Storage What to look for in a green cloud storage provider 10 Mar 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Maintenance and continuous improvement 09 Mar 2022 Data Center hot/cold aisle 28 Feb 2022 Networking Network Time Protocol (NTP) 28 Feb 2022 Data Center computer room air handler (CRAH) 17 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Staff training, incident and media management 08 Feb 2022 Data Center utility computing 04 Feb 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Setting strategy and developing plans 27 Jan 2022 Security Top cloud security standards and frameworks to consider 21 Jan 2022 ComputerWeekly.com Cloud-era disaster recovery planning: Assessing risk and business impact 19 Jan 2022 Storage Tips to reduce the environmental impact of data storage 27 Dec 2021 Disaster Recovery What is the role of qualitative and quantitative impact in DR? 16 Nov 2021 Storage How to effectively plan cloud storage scalability 15 Nov 2021 Mobile Computing satellite 15 Nov 2021 Networking How zero-trust SDP can work with a VPN for remote work 15 Nov 2021 Disaster Recovery Prepare a supply chain disaster recovery plan 10 Nov 2021 Security Steps for building a privacy program, plus checklist 05 Nov 2021 Unified Communications VoIP caller ID (voice over Internet Protocol caller identification) 05 Nov 2021 Data Center single point of failure (SPOF) 04 Nov 2021 Networking What are the 6 components of structured cabling? 04 Nov 2021 Security Report on Compliance (ROC) 03 Nov 2021 Disaster Recovery How to calculate and reduce MTTR 01 Nov 2021 Storage Perform data storage testing to prevent issues 29 Oct 2021 Storage tape drive 28 Oct 2021 Storage Understand your storage infrastructure management 28 Oct 2021 Security Securities and Exchange Commission (SEC) 27 Oct 2021 Storage Data retention and destruction policy template: A free download 20 Oct 2021 Storage storage capacity planning 18 Oct 2021 CIO How to evaluate and select GRC vendors and tools 12 Oct 2021 Data Backup Backup scheduling best practices to ensure availability 07 Oct 2021 1 2 3 4 5