It's like disaster recovery (and business continuity) planning is the end-of-term research paper that the professor mentioned on the first day of class, but which most students don't start...
2024-10-23 (first published: 2024-10-10)
169 reads
Recently, on a post celebrating a female professional earning a significant achievement within the cybersecurity field, another individual (male) commented wondering if this was due to DEI. The one...
2024-10-11 (first published: 2024-09-24)
232 reads
I’m sick of meetings and I know many other folks are, too. Every time a knowledge worker (such as IT or cybersecurity but also business) has to go to...
2024-08-23 (first published: 2024-08-09)
305 reads
Just as it's important to take care of our physical health (and I'm guilty of neglecting that), it is important to take care of our mental health, too. Also,...
2024-06-10 (first published: 2024-05-20)
276 reads
Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
396 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
435 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
274 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
262 reads