Once upon a time, I used to think of difficult technical questions to ask candidates for a DBA position. However, over time I came to understand that in most...
2024-06-07 (first published: 2024-05-14)
413 reads
I did a post last month titled RTO and RPO are myths unless you've tested recovery, but I only briefly covered what RPO and RTO are. This post goes...
2024-05-31 (first published: 2024-05-10)
489 reads
Another security fundamentals topic is authentication versus authorization. For those who have a clear understanding of the difference between the two, like with Recovery Point Objective (RPO) vs. Recovery...
2024-05-24 (first published: 2024-05-03)
291 reads
he rollback plan... what to do when things go wrong to get back to where you were before the deployment or implementation. I've seen too many cases where a...
2024-05-17 (first published: 2024-05-01)
341 reads
In information security (INFOSEC), there several foundational concepts and principles. One of the ones that’s introduced almost immediately is called the CIA triad or the Information Security Triad. While...
2024-05-13 (first published: 2024-04-26)
228 reads
As I look at the state of information technology today, I see one constant: rapid change. We all see it. While this is the type of post I would...
2024-05-08 (first published: 2024-04-22)
172 reads
I’ve watched teams spend a lot of time on backup strategy. They plan out the full, differential, and log backups to ensure they can successfully meet the recovery point...
2024-04-17 (first published: 2024-04-05)
303 reads