Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Cloud
  • 5G
  • Big Data
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • Two keys representing passkeys.
    Image: 1Password
    Security

    1Password enables passkeys — a new option from passwords

    Identity management company 1Password is spinning up a pair of new features that constitute a major shift away from passwords and toward their low-friction replacement: passkeys.

    Karl Greenberg
    Published:  June 2, 2023, 12:06 PM EDT Modified:  June 2, 2023, 12:06 PM EDT Read More See more Security
  • Businessman touch fingers to scan reset password login online concept, cyber security and entering username and password of social media, log in smartphone online bank account, data protection hacker.
    Image: Bussarin/Adobe Stock
    Security

    Most people are aware of their data trails, but few know how to deal with it: Okta study

    A new study by Okta finds that a proliferation of active accounts and web identities is exacerbating security risks both for individuals and enterprises.

    Karl Greenberg
    Published:  June 1, 2023, 2:22 PM EDT Modified:  June 2, 2023, 11:45 AM EDT Read More See more Security
  • botnet.jpg
    Image: iStock/bagotaj
    Security

    Threatening botnets can be created with little code experience, Akamai finds

    Researchers at Akamai’s Security Intelligence unit find a botnet specimen that reveals how successful DDoS, spam and other cyberattacks can be done with little finesse, knowledge or savvy.

    Karl Greenberg
    Published:  May 31, 2023, 10:26 AM EDT Modified:  June 1, 2023, 9:24 AM EDT Read More See more Security
  • This illustration shows a shield and lock on a vector of the world.
    Image: Google
    Security

    Google offers certificate in cybersecurity, no dorm room required 

    Google adds a Cybersecurity Certificate to its Career Certificates program, which offers paths to such enterprise tech fields as data analytics, IT support and business intelligence. 

    Karl Greenberg
    Published:  May 30, 2023, 2:15 PM EDT Modified:  May 30, 2023, 4:31 PM EDT Read More See more Security
  • The word GDPR and data protection symbols on an abstract background.
    Image: Lucadp/Adobe Stock
    Security

    Experts laud GDPR at five year milestone

    The GDPR, in effect for five years on May 25, has influenced the U.S. data privacy laws and is likely to exert itself when AI creates a new set of privacy challenges.

    Karl Greenberg
    Published:  May 25, 2023, 6:23 PM EDT Modified:  May 25, 2023, 6:23 PM EDT Read More See more Security
  • A cyber attack visualization.
    Image: pinkeyes/Adobe Stock
    Security

    Microsoft warns of Volt Typhoon, latest salvo in global cyberwar

    Microsoft published specifics on the Volt Typhoon state-aligned China actor. Experts say raising awareness of threats is critical.

    Karl Greenberg
    Published:  May 25, 2023, 4:57 PM EDT Modified:  May 25, 2023, 4:57 PM EDT Read More See more Security
  • cybersecurity
    Image: Getty Images/iStockphoto
    Cloud

    WithSecure launches ‘outcome-based’ security at Sphere23 conference

    At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes.

    Karl Greenberg
    Published:  May 25, 2023, 1:49 PM EDT Modified:  May 25, 2023, 3:23 PM EDT Read More See more Cloud
  • A hook on a keyboard.
    Image: ronstik/Adobe Stock
    Security

    Spearphishing report: 50% of companies were impacted in 2022

    Barracuda Networks found that spearphishing exploits last year worked to great effect and took days to detect.

    Karl Greenberg
    Published:  May 24, 2023, 3:08 PM EDT Modified:  May 25, 2023, 7:16 AM EDT Read More See more Security
  • An AI hand and business person's hand touching a brain.
    Image: peshkova/Adobe Stock
    Innovation

    EY survey: Tech leaders to invest in AI, 5G, cybersecurity, big data, metaverse

    Generative AI is of particular interest to leaders for the benefits of cost savings, efficiency and effectiveness.

    Karl Greenberg
    Published:  May 23, 2023, 4:46 PM EDT Modified:  May 23, 2023, 11:17 PM EDT Read More See more Innovation
  • This illustration shows a lock, unlocked over a person at a keyboard.
    Image: Adobe Stock.
    Security

    How business email compromise attacks emulate legitimate web services to lure clicks

    New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft.

    Karl Greenberg
    Published:  May 19, 2023, 2:10 PM EDT Modified:  May 19, 2023, 2:23 PM EDT Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
90 results

TechRepublic Premium

  • TechRepublic Premium

    Checklist: Network and systems security

    Cybersecurity demands and the stakes of failing to properly secure systems and networks are high. While every organization’s specific security needs form a unique and complex blend of interconnected requirements, numerous security fundamentals almost always apply to each of these groups. It stands to reason that cybersecurity pros who effectively identify network and systems risks ...

    Published:  June 1, 2023, 4:00 PM EDT Modified:  June 2, 2023, 7:48 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to host multiple websites on Linux with Apache

    In this guide from TechRepublic Premium we’re going to explore the various things you can do with a Linux server. We won’t leave out any steps, so you won’t have to refer to another tutorial to complete the process. The only step we will leave out is the installation of Linux, as we’ll assume you ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:45 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to deploy an application with Kubernetes

    If you want to deploy applications into a Kubernetes cluster, be warned — it’s not the easiest task. There are a lot of moving pieces that go into these scalable containers. Don’t you wish you had a complete roadmap, from start to finish, to walk you through the process of deploying the Kubernetes cluster, deploying ...

    Downloads
    Published:  May 31, 2023, 4:00 PM EDT Modified:  June 1, 2023, 7:51 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cross-training tool kit

    The more flexibility you can create in your technology workforce, the better you’ll be equipped to manage tomorrow, whatever the future brings. Too often, we focus on helping our teams become technical specialists who know volumes about a single technology, but quickly lose sight of how that technology connects with others. This makes their skills ...

    Downloads
    Published:  May 30, 2023, 4:00 PM EDT Modified:  May 31, 2023, 4:50 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice