Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • Cybersecurity EDR tools comparison.
    Image: Michael Traitov/Adobe Stock
    Security

    New National Cybersecurity Strategy: resilience, regs, collaboration and pain (for attackers)

    The Biden administration’s National Cybersecurity Strategy aims to go after attackers, cultivate a resilience-first defensive posture and build public, private and international collaboration.

    Karl Greenberg
    Published:  March 6, 2023, 1:20 PM EST Modified:  March 6, 2023, 1:20 PM EST Read More See more Security
  • A user typing a password.
    Image: Song_about_summer/Adobe Stock
    Security

    1Password is looking to a password-free future. Here’s why

    With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to 'eliminate’ passwords entirely.

    Karl Greenberg
    Published:  March 2, 2023, 3:44 PM EST Modified:  March 7, 2023, 4:10 PM EST Read More See more Security
  • Concept of simulating cyber attack on software applications known as penetration testing, this illustrates how some of the cyber attacks can break the security systems through weak security standards, configuration and code
    Image: Vallepugraphics/Adobe Stock
    Security

    Pen testing report: IT budgets should focus on entire security stack

    With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report.

    Karl Greenberg
    Published:  February 28, 2023, 2:05 PM EST Modified:  February 28, 2023, 2:14 PM EST Read More See more Security
  • Scrabble tiles scattered in front of some glasses with a few standing up that spell out CVE
    Image: lexiconimages/Adobe Stock
    Security

    DLL sideloading and CVE attacks show diversity of threat landscape

    Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software.

    Karl Greenberg
    Published:  February 24, 2023, 10:59 AM EST Modified:  February 24, 2023, 4:02 PM EST Read More See more Security
  • A cybersecurity worker identifies an issue.
    Image: leowolfert/Adobe Stock
    Tech & Work

    Report: Stress will drive a quarter of cyber defenders out the door

    There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills.

    Karl Greenberg
    Published:  February 23, 2023, 3:16 PM EST Modified:  February 23, 2023, 3:16 PM EST Read More See more Tech & Work
  • A keyboard with a cyber attack coming through a key that says backdoor.
    Image: Imillian/Adobe Stock
    Security

    IBM: Most ransomware blocked last year, but cyberattacks are moving faster

    A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters.

    Karl Greenberg
    Published:  February 22, 2023, 12:01 AM EST Modified:  February 21, 2023, 6:52 PM EST Read More See more Security
  • The Creation of robot Adam
    Image: PayPau/Adobe Stock
    Artificial Intelligence

    Salesforce offers 5 guidelines to reduce AI bias

    The bias-reduction study guides companies in ways to build trust, safety and sustainability from their AI data stores and when to empower humans in the oversight of these models.

    Karl Greenberg
    Published:  February 21, 2023, 3:46 PM EST Modified:  February 22, 2023, 3:12 PM EST Read More See more Artificial Intelligence
  • A digital transformation turning data into a butterfly.
    Image: Shutter2U/Adobe Stock
    CXO

    Cisco CXO: Digital transformation means transforming customer outcomes

    Cisco’s Chief Customer Experience Officer Thimaya Subaiya discusses low-power chips that will empower next-generation IoT, how data centers can reach net zero goals, zero trust and more.

    Karl Greenberg
    Published:  February 17, 2023, 1:52 PM EST Modified:  February 17, 2023, 1:52 PM EST Read More See more CXO
  • An email attack visualization of a rusty hook catching an envelope.
    Image: RareStock/Adobe Stock
    Security

    Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

    A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps.

    Karl Greenberg
    Published:  February 15, 2023, 1:53 PM EST Modified:  February 15, 2023, 1:53 PM EST Read More See more Security
  • People standing in circles that are interconnected like a web
    Image: Picture Cells/Adobe Stock
    Tech & Work

    What Twitter’s outage says about (over) zealous downsizing

    The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce.

    Karl Greenberg
    Published:  February 15, 2023, 9:33 AM EST Modified:  February 21, 2023, 1:49 PM EST Read More See more Tech & Work
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
46 results

TechRepublic Premium

  • TechRepublic Premium

    Employee privacy policy

    PURPOSE This policy describes the organization’s employee privacy guidelines and outlines employee privacy expectations. From the policy: POLICY DETAILS The organization’s IT equipment, services and systems are intended for business use only. However, the organization acknowledges that staff, consultants and volunteers occasionally require opportunities to make or receive personal phone calls, access personal email, utilize ...

    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Security response policy

    PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. This policy will assist to identify and resolve information security incidents quickly and effectively, thus minimizing their business impact and reducing the risk of similar incidents recurring. It includes requirements for both ...

    Downloads
    Published:  March 19, 2023, 12:00 PM EDT Modified:  March 20, 2023, 4:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    End user data backup policy

    PURPOSE This policy from TechRepublic Premium provides guidelines for reliable and secure backups of end user data. It outlines the responsibilities of IT departments and employees to identify tasks and action items for each group. The policy can be customized to fit the needs of your organization. From the policy: IT STAFF RESPONSIBILITIES IT staff ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 5:00 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Electronic communication policy

    This policy from TechRepublic Premium provides guidelines for the appropriate use of electronic communications. It covers topics such as privacy, confidentiality and security; ensures electronic communications resources are used for appropriate purposes; informs employees regarding the applicability of laws and company policies to electronic communications; and prevents disruptions to and misuse of company electronic communications ...

    Published:  March 16, 2023, 12:00 PM EDT Modified:  March 17, 2023, 3:00 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice