CISSP Question of the Week: Implement Redundant Servers

While completing the business impact analysis, the committee discovers that a human resources application relies on two servers (human resources server managed by the human resources department in San Antonio, Texas and a database server managed by the IT department in San Antonio, Texas). At the suggestion of the business continuity plan committee, management decides to implement redundant servers for both of these servers and place the redundant servers in the branch office in Seattle, Washington. What are the two new servers an example of?

Read more

CISSP Question of the Week: Implement Redundant Servers

While completing the business impact analysis, the committee discovers that a human resources application relies on two servers (human resources server managed by the human resources department in San Antonio, Texas and a database server managed by the IT department in San Antonio, Texas). At the suggestion of the business continuity plan committee, management decides to implement redundant servers for both of these servers and place the redundant servers in the branch office in Seattle, Washington. What are the two new servers an example of?

Read more

There’s a Hot Demand for Developer Skills and We’re Here to Help

By 2022 there will be more than 1 million developer jobs, according to U.S Department of Labor. This illustrates an average 21 percent growth from 2012. The growing adoption of mobile and cloud operating systems, along with corporate initiatives aligned to BYOD, software-defined networking and big data analytics, means traditional IT professionals and enterprise architects are having to expand their application development skills.

Read more

Your Evolving Digital Life: How Hackable Are Your Smart Devices?

As the Internet of Things (IoT) grows and more people adopt smart home technology, we need to think about balancing features and capabilities with cybersecurity. This blog covers a few devices and services that you might need to be aware of in order to protect your home, personal information or your organization.

Read more