Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • A phishing attack via email.
    Image: MASHKA/Adobe Stock
    Security

    New cybersecurity data reveals persistent social engineering vulnerabilities

    Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in the last six months of 2022.

    Karl Greenberg
    Published:  February 8, 2023, 6:00 AM EST Modified:  February 7, 2023, 6:56 PM EST Read More See more Security
  • People as avatars having a business meeting in a virtual metaverse VR office.
    Image: supamotion/Adobe Stock
    Security

    Metaverse adds new dimensions to Web 3.0 cybersecurity

    With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game will continue, but with more dimensions.

    Karl Greenberg
    Published:  February 7, 2023, 3:57 PM EST Modified:  February 7, 2023, 3:57 PM EST Read More See more Security
  • A businessman holding up a lock that reads 5G.
    Image: maxsim/Adobe Stock
    5G

    For secure 5G virtual networks, a “RAN opener” for wireless could cut both ways

    Open radio access networks for 5G creates numerous opportunities for innovating telecommunications and cultivating a vendor ecosystem for wireless networks, but a security mindset can’t be an afterthought.

    Karl Greenberg
    Published:  February 7, 2023, 7:41 AM EST Modified:  February 7, 2023, 12:35 PM EST Read More See more 5G
  • digital transformation text surrounded by data-related icons
    Image: WrightStudio/Adobe Stock
    Security

    Study: Companies have upwards of 1,000 apps but only a third are integrated

    A new study by Salesforce’s MuleSoft suggests more isn’t necessarily better if an organization’s applications are not playing well together. Unfortunately, more than 70% remain disconnected from one another and the core business.

    Karl Greenberg
    Published:  February 2, 2023, 11:20 AM EST Modified:  February 2, 2023, 11:20 AM EST Read More See more Security
  • A team using a unified communications and collaborations platform.
    Image: Kateryna/Adobe Stock
    Tech & Work

    Why IT leaders are investing in unified communications and collaborations platforms

    Microsoft Teams and Zoom are still the most popular UC&C solutions, according to a new study that surveyed IT decision-makers.

    Karl Greenberg
    Published:  February 1, 2023, 5:11 PM EST Modified:  February 7, 2023, 1:24 PM EST Read More See more Tech & Work
  • An email attack visualization of a rusty hook catching an envelope.
    Image: RareStock/Adobe Stock
    Security

    New cybersecurity BEC attack mimics vendors

    A new business email attack threat actor is using a stealth tactic to avoid giveaways of typical social engineering attacks. Learn the best defense for protecting your company.

    Karl Greenberg
    Published:  February 1, 2023, 3:32 PM EST Modified:  February 1, 2023, 3:32 PM EST Read More See more Security
  • There are dollars on the table and there is a clothespin with paper on which it is written - CYBER SECURITY
    Image: Dzmitry/Adobe Stock
    Security

    Here’s how IT budgets should fill cybersecurity moats in 2023

    TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity — even if their budgets are tighter.

    Karl Greenberg
    Published:  January 27, 2023, 9:25 AM EST Modified:  January 28, 2023, 3:06 AM EST Read More See more Security
  • A person making recording calculations on a calculator with icons of interlinking locks hovering
    Image: VideoFlow/Adobe Stock
    Security

    Survey: Cybersecurity budgets aren’t matching cybersecurity challenges

    A new study finds that due to the growing threat surface from hybrid work and third-party vendors, only half of organizations have the budget to meet current cybersecurity needs.

    Karl Greenberg
    Published:  January 25, 2023, 1:43 PM EST Modified:  January 25, 2023, 3:19 PM EST Read More See more Security
  • Telecommunication network above city, wireless mobile internet technology for smart grid or 5G LTE data connection, concept about IoT, global business, fintech, blockchain
    Image: NicoElNino/Adobe Stock
    5G

    The risks of 5G security

    Unless you've been living under a rock for the past decade, you’ve probably heard of 5G telecommunications. But what is it?

    Karl Greenberg
    Published:  January 25, 2023, 11:23 AM EST Modified:  January 25, 2023, 11:23 AM EST Read More See more 5G
  • A hologram with writing that says Zero Trust.
    Image: Alexander/Adobe Stock
    Security

    Companies slow to “mask up” with zero trust cybersecurity protocols

    A new study by Gartner predicts that by 2026 just 10% of companies will have zero-trust protocols in place against cybersecurity exploits.

    Karl Greenberg
    Published:  January 24, 2023, 12:16 PM EST Modified:  January 25, 2023, 6:14 AM EST Read More See more Security
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
53 results

TechRepublic Premium

  • TechRepublic Premium

    Media disposal policy

    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:06 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    IT email templates: Upcoming software release

    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:29 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice