Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • Scrabble tiles scattered in front of some glasses with a few standing up that spell out CVE
    Image: lexiconimages/Adobe Stock
    Security

    DLL sideloading and CVE attacks show diversity of threat landscape

    Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software.

    Karl Greenberg
    Published:  February 24, 2023, 10:59 AM EST Modified:  February 24, 2023, 4:02 PM EST Read More See more Security
  • A cybersecurity worker identifies an issue.
    Image: leowolfert/Adobe Stock
    Tech & Work

    Report: Stress will drive a quarter of cyber defenders out the door

    There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills.

    Karl Greenberg
    Published:  February 23, 2023, 3:16 PM EST Modified:  February 23, 2023, 3:16 PM EST Read More See more Tech & Work
  • A keyboard with a cyber attack coming through a key that says backdoor.
    Image: Imillian/Adobe Stock
    Security

    IBM: Most ransomware blocked last year, but cyberattacks are moving faster

    A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters.

    Karl Greenberg
    Published:  February 22, 2023, 12:01 AM EST Modified:  February 21, 2023, 6:52 PM EST Read More See more Security
  • The Creation of robot Adam
    Image: PayPau/Adobe Stock
    Artificial Intelligence

    Salesforce offers 5 guidelines to reduce AI bias

    The bias-reduction study guides companies in ways to build trust, safety and sustainability from their AI data stores and when to empower humans in the oversight of these models.

    Karl Greenberg
    Published:  February 21, 2023, 3:46 PM EST Modified:  February 22, 2023, 3:12 PM EST Read More See more Artificial Intelligence
  • A digital transformation turning data into a butterfly.
    Image: Shutter2U/Adobe Stock
    CXO

    Cisco CXO: Digital transformation means transforming customer outcomes

    Cisco’s Chief Customer Experience Officer Thimaya Subaiya discusses low-power chips that will empower next-generation IoT, how data centers can reach net zero goals, zero trust and more.

    Karl Greenberg
    Published:  February 17, 2023, 1:52 PM EST Modified:  February 17, 2023, 1:52 PM EST Read More See more CXO
  • An email attack visualization of a rusty hook catching an envelope.
    Image: RareStock/Adobe Stock
    Security

    Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

    A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps.

    Karl Greenberg
    Published:  February 15, 2023, 1:53 PM EST Modified:  February 15, 2023, 1:53 PM EST Read More See more Security
  • People standing in circles that are interconnected like a web
    Image: Picture Cells/Adobe Stock
    Tech & Work

    What Twitter’s outage says about (over) zealous downsizing

    The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce.

    Karl Greenberg
    Published:  February 15, 2023, 9:33 AM EST Modified:  February 21, 2023, 1:49 PM EST Read More See more Tech & Work
  • Internet technology network cyber security concept of protect computer virus attack with lock icon on network connectivity.
    Image: your123/Adobe Stock
    Security

    Check Point’s annual cybersecurity event spotlights power of AI

    The company showcased dozens of new security tools and services to detect and prevent malware, phishing, ransomware and other attacks, but AI took center stage.

    Karl Greenberg
    Published:  February 13, 2023, 5:23 PM EST Modified:  February 13, 2023, 5:23 PM EST Read More See more Security
  • Data behind a padlock representing privacy.
    Image: Anthony Brown/Adobe Stock
    CXO

    Cisco: Companies are spending on privacy protection, but do customers know it?

    The 2023 Benchmark survey of security pros worldwide found that companies are taking action on customer privacy, but transparency is key.

    Karl Greenberg
    Published:  February 10, 2023, 1:30 PM EST Modified:  February 10, 2023, 1:30 PM EST Read More See more CXO
  • Data consisting of 0 and 1 across a screen.
    Image: gonin/Adobe Stock
    Big Data

    For enterprise APIs, is Zero-Copy Integration the David to big data’s Goliath?

    Analysts from IDC to PBT Group have predicted the volume of stored data worldwide could reach 180 zettabytes by 2025, packing the cloud and data centers. Is Zero-Copy Integration a solution?

    Karl Greenberg
    Published:  February 9, 2023, 12:09 PM EST Modified:  February 9, 2023, 12:09 PM EST Read More See more Big Data
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
53 results

TechRepublic Premium

  • TechRepublic Premium

    Media disposal policy

    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:06 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    IT email templates: Upcoming software release

    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:29 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice