Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • The ChatGPT logo on a phone in front of the OpenAI logo.
    Image: gguy/Adobe Stock
    Security

    As a cybersecurity blade, ChatGPT can cut both ways

    The cybersecurity implications of ChatGPT are vast, especially for email exploits, but putting up guardrails, flagging elements of phishing emails that it doesn’t touch and using it to train itself could help boost defense.

    Karl Greenberg
    Published:  January 19, 2023, 11:57 AM EST Modified:  January 19, 2023, 11:57 AM EST Read More See more Security
  • A fighter jet.
    Image: Pixabay/Pexels
    Security

    SimSpace CEO brings dogfight mentality to terra firma for IT cybersecurity training

    William “Hutch” Hutchison, founder and CEO of SimSpace, speaks with Karl Greenberg about the virtues of cyber ranges in training IT teams, and SimSpace’s own specialty: Digital-twin based ranges that the firm provides to NATO governments worldwide, including security teams in Ukraine.

    Karl Greenberg
    Published:  January 17, 2023, 5:09 PM EST Modified:  January 19, 2023, 3:31 AM EST Read More See more Security
  • A series of locks representing cybersecurity. One has popped open.
    Image: Askha/Adobe Stock
    Security

    Recent 2022 cyberattacks presage a rocky 2023

    A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce under duress, a step behind and understaffed with some 3.4 million vacant seats.

    Karl Greenberg
    Published:  January 6, 2023, 2:22 PM EST Modified:  January 6, 2023, 2:22 PM EST Read More See more Security
  • Two interlocking keys representing encryption over a background of machine code.
    Image: faithie/Adobe Stock
    Security

    Cloud email services bolster encryption against hackers

    Google, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector attacks from the first half of 2022.

    Karl Greenberg
    Published:  January 5, 2023, 12:31 PM EST Modified:  January 5, 2023, 12:31 PM EST Read More See more Security
  • Gusto vs Quickbooks.
    Image: Rebecca Olason/TechRepublic
    Software

    Gusto vs QuickBooks Payroll: Which Software Is Better for 2023?

    Payroll processing can be painful for SMBs. Luckily, there are highly versatile, subscription-based software services in the cloud. We look at two of the consistent winners.

    Karl Greenberg
    Published:  January 3, 2023, 4:23 PM EST Modified:  March 20, 2023, 4:16 PM EDT Read More See more Software
  • GitHub logo on the screen smartphone and notebook closeup.
    Image: prima91/Adobe Stock
    Developer

    GitHub offers secret scanning for free

    The open source software development service has made it easier for developers using its public repositories to keep coding secrets and tokens close to the chest.

    Karl Greenberg
    Published:  December 22, 2022, 1:15 PM EST Modified:  March 28, 2023, 10:04 AM EDT Read More See more Developer
  • A red lock representing cybersecurity is being destroyed.
    Image: Ar_TH /Adobe Stock
    Security

    Ransomware, DDoS see major upsurge led by upstart hacker group

    Cyber threat actors Cuba and Royal are driving a 41% boom in ransomware and other attacks hitting industry and consumer goods and services.

    Karl Greenberg
    Published:  December 22, 2022, 12:48 PM EST Modified:  December 22, 2022, 1:30 PM EST Read More See more Security
  • Internet technology network cyber security concept of protect computer virus attack with lock icon on network connectivity.
    Image: your123/Adobe Stock
    Security

    Study: Consumer security savvy is way behind IoT threat landscape

    A new Comcast study hints at a major risk to businesses, governments and public systems due to poor cybersecurity in the booming Internet of Things industry.

    Karl Greenberg
    Published:  December 20, 2022, 1:22 PM EST Modified:  December 20, 2022, 4:33 PM EST Read More See more Security
  • A bad password written on a paper with marker.
    Image: Vitalii Vodolazskyi/Adobe Stock
    Security

    Security alert: Use these most popular passwords at your peril

    Yes, there’s a good chance “123456” is the code to the restroom at your local Starbucks, but it is also the second most popular password worldwide, according to a new study by password manager NordPass. That can’t be good.

    Karl Greenberg
    Published:  December 15, 2022, 11:31 AM PST Modified:  December 19, 2022, 11:49 AM EST Read More See more Security
  • Writing programming functions on laptop. New technology revolution. Source code close-up. Big data and Internet of things trend. Coding hacker concept. JavaScript code in text editor.
    Image: maciek905/Adobe Stock
    Security

    Open source code for commercial software applications is ubiquitous, but so is the risk

    As the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences. A new study looks at the open source community’s efforts to “credit-rate” the risk.

    Karl Greenberg
    Published:  December 14, 2022, 2:14 PM PST Modified:  December 17, 2022, 12:04 AM EST Read More See more Security
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
53 results

TechRepublic Premium

  • TechRepublic Premium

    Media disposal policy

    PURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media. From the policy: POLICY DETAILS When disposing of damaged, unusable, obsolete, off-lease, decommissioned, old, or end-of-service-life equipment and media, the organization requires that the guidelines outlined herein be followed: Hard drives, ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:06 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    IT email templates: Upcoming software release

    PURPOSE To take some of the effort out of writing (and rewriting) emails to share with company staff and executives, TechRepublic Premium has assembled basic templates to handle the most common types of communications. Simply copy the text into your favorite word processor and customize it to fit your needs. Then, paste it into an ...

    Published:  March 30, 2023, 12:00 PM EDT Modified:  March 31, 2023, 11:29 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Mobile app development policy

    PURPOSE The purpose of this policy from TechRepublic Premium is to provide guidelines for developing mobile applications from a security, procedural and best practices standpoint. While it contains technical guidelines, it is not intended to serve as a programming guide but as a framework for operations. This policy can be customized as needed to fit ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:43 PM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New client audit checklist

    PURPOSE This checklist from TechRepublic Premium provides a method for auditing and documenting a client site and assembling an inventory of systems and software, as well as giving you a framework for developing recommendations, applying costs to them, and storing all that information in one file. Tracking client contact details, circuit information, network equipment, cloud ...

    Published:  March 29, 2023, 12:00 PM EDT Modified:  March 30, 2023, 4:54 PM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice