Media Database
>
Paul Kirvan

Paul Kirvan

Freelance/Independent Consultant/IT Auditor and Contributing Technical Writer/Editor/Educator at TechTarget

Contact this person
Email address
p*****@*******.comGet email address
Influence score
66
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Electrical
  • Computers & Technology
  • Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

techtarget.com

Glossary of 25 top data storage terms you should know

Explore this list of top data storage terms that users, admins and managers need to know, including cloud, disk, flash and tape definitions.
techtarget.com

TB vs. GB: Is a terabyte bigger than a gigabyte?

Which is bigger: a terabyte or gigabyte? Learn more about the TB vs. GB comparison and how other data storage measurements match up with a terabyte.
techtarget.com

What is IIoT (Industrial Internet of Things)?

Learn what IIoT is, how it works, and its pros and cons. Examine how it’s applied as well as how it compares to IoT.
techtarget.com

How to Remove Ransomware: Step by Step

Ransomware removal is challenging but not impossible. Learn how to remove ransomware in four key steps, along with measures to prevent falling victim.
techtarget.com

Top Business Continuity Risks to Plan for and Monitor

Learn what the biggest business continuity risks are and how to monitor and protect against them.
techtarget.com

12 best practices to keep in mind for SLA compliance

SLAs are legal contracts and should include some specific elements. Learn the best practices to follow for SLA compliance.
techtarget.com

Incident Response Tabletop Exercises: Guide and Template

Learn how incident response tabletop exercises help ensure the strength of an organization’s incident response plan in the event of an emergency.
techtarget.com

Implement a business continuity plan for remote workers

Managing business continuity and disaster recovery without employees on site can be a challenge for an organization that doesn’t typically function remotely.
techtarget.com

6 DRaaS risks to assess and mitigate

DRaaS is a helpful tool for disaster recovery teams to securely and quickly recover data. But it's critical to assess the associated risks.
techtarget.com

CISO's Guide to Building a Strong Cyber-resilience Strategy

As threats continue to escalate, an effective cyber-resilience strategy is critical. Learn how to build a foundation to keep your organization protected.
techtarget.com

What a smart contract audit is, and how to conduct one

Learn how to conduct a smart contract audit to ensure these self-executing programs perform as expected.
techtarget.com

How to craft an effective AI security policy for enterprises

The advent of generative AI threatens to poke additional holes in your cybersecurity strategy. Compiling a GenAI-based security policy to guide your responses can help.
techtarget.com

IoT compliance standards and how to comply

IT leaders must be familiar with existing compliance standards that apply to IoT. Learn how to best establish IoT compliance in the enterprise.
techtarget.com

Data center power outage causes and how to prevent them

Data centers need nonstop power for critical operations. Discover how organizations can protect against costly data center power outages with this article.
techtarget.com

What is business resilience?

Learn about business resilience, an organization's ability to adapt quickly to disruptions and maintain operations, safeguard people and protect its brand.
techtarget.com

12 remote access security risks and how to prevent them

End users’ behavior and their lax security habits are perhaps the biggest remote access security risks that IT groups need to address.
techtarget.com

7 ways to improve your ransomware backup strategy

Given the complicated threat landscape, an updated ransomware backup strategy is critical for any organization. Artificial intelligence is one area that could help.
techtarget.com

What is cloud NAS (cloud network-attached storage)?

Learn what cloud network attached storage (NAS) is, how it works, its advantages compared to on-site NAS and what applications it’s best for.
techtarget.com

How to avoid and prevent social engineering attacks

Learning how to prevent social engineering attacks reduces the chances of data breaches. Read up on best practices for organizations and employees.
techtarget.com

How to assess pandemic risk in 2025

While COVID-19 is not making as many headlines as it used to, the need for businesses to conduct a pandemic risk assessment has not gone anywhere.
techtarget.com

SEC cybersecurity disclosure rules, with checklist

The SEC requires public companies to disclose certain information about cybersecurity incidents and practices. Learn more.