Hundreds of IT policy templates, job hiring kits and glossaries, right at your fingertips. Find out more View full calendar
Premium

FeaturedPremium

  • Mobile Device Security Policy

    TechRepublic Premium

    Mobile Device Security Policy

    Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizable. In addition, the same social engineering, phishing and application/operating system vulnerabilities which plague desktops ...

  • How to Become a Prompt Engineer

    TechRepublic Premium

    How to Become a Prompt Engineer

    Organizations of all sizes are searching for qualified prompt engineers to develop, test and refine their artificial intelligence systems. Is this exploding career choice the one for you? Find out in this guide from TechRepublic Premium. You can get more information on this topic with our Hiring Kit: Prompt Engineer. Featured text from the download: ...

  • Quick Glossary: Biometrics

    TechRepublic Premium

    Quick Glossary: Biometrics

    Driven by advancements in hardware, software, machine learning and artificial intelligence, biometric technology is today more accessible than ever, making it easier for any organization to deploy the technology and reap its benefits. TechRepublic Premium presents this biometrics glossary to help you understand the tech behind the sector and the core fundamentals of the industry. ...

  • Cloud Access Security Broker Policy

    TechRepublic Premium

    Cloud Access Security Broker Policy

    The rise in cloud adoption has made it imperative for more businesses to rely on cloud providers to store, access and manage their data and applications. While running applications and services in the cloud offers much-needed flexibility and scalability, it also introduces new security challenges. The purpose of this Cloud Access Security Broker Policy is ...

Editorial Calendar

  • Feb23
    10 Must-Read Books on Cloud Computing $9
  • Feb23
    Meal and Break Periods Policy $9
  • Feb23
    Checklist: Network and Systems Security $9
  • Feb26
    Cloud Security Policy $9
  • Feb26
    Hiring Kit: Marketing Art Director $9
  • Feb26
    MSP Best Practices: Network Switch and Router Maintenance Checklist $9
  • Feb27
    10 Surefire Ways to Kill Morale FREE
  • Feb27
    The Creation and Evolution of a Startup Business Plan $9
  • Feb27
    Artificial Intelligence Ethics Policy $9
  • Feb27
    Employee Termination Checklist $9
  • Feb28
    GDPR Security Pack $29
  • Feb28
    Comparison Chart: NAS Devices FREE
  • Feb28
    How to Choose a Great Co-Founder for Your Startup $9
  • Feb28
    Bring Your Own Device Policy $9
  • Feb29
    Checklist: Microsoft 365 App and Services Deployments on Macs $9
  • Feb29
    Asset Control Policy $9
  • Feb29
    10 Must-Read Books on Cybersecurity $9
  • Mar1
    Checklist: Onboarding and Offboarding IT Staff $9
  • Mar1
    Data Center Access Policy $9
  • Mar1
    Computer Hardware Depreciation Calculator $9
  • Mar4
    Cloud Migration Decision Tool FREE
  • Mar4
    Checklist: Office Relocation $9