Hundreds of IT policy templates, job hiring kits and glossaries, right at your fingertips. Find out more View full calendar
Premium

FeaturedPremium

  • How to Spot a Phishing Email Attempt

    TechRepublic Premium

    How to Spot a Phishing Email Attempt

    Phishing attacks are one of the most common types of data breach attempts, with 31,000 phishing attacks launching every single day, according to cybersecurity firm SlashNext. Furthermore, 77% of cybersecurity professionals report being targeted by phishing attacks, proving just how widespread these attacks are. The rise of ChatGPT and similar generative AI tools has made ...

  • How to Become an Expert at SELinux

    TechRepublic Premium

    How to Become an Expert at SELinux

    SELinux stands for Security-Enhanced Linux. It is a Linux kernel security model that provides a hardened set of access control security policies for the Linux operating system. SELinux tends to get a bad rap, because it often seems to go out of its way to prevent legitimate applications from working. This guide, created by Jack ...

  • Encryption Policy

    TechRepublic Premium

    Encryption Policy

    Encryption is vital for securing data, whether in transit or stored on devices. It can provide peace of mind that communications will not be intercepted and that sensitive information stored on devices can’t be exfiltrated in the event of loss or theft. This policy from TechRepublic Premium provides guidelines for adopting encryption technologies for organizational ...

  • Quick Glossary: Retailtech

    TechRepublic Premium

    Quick Glossary: Retailtech

    Retail technology, a.k.a. retailtech, continues to be the driving force behind the changing retail landscape today. Some of the newest developments include scan-and-go checkouts, visual outfitting software and digital price tags. While these retailtech developments are exciting, the entire sector is also filled with jargon and acronyms that are difficult to decipher. This glossary, written ...

Editorial Calendar

  • Jul24
    Drone Usage Policy $9
  • Jul24
    Ubuntu Server Installation Checklist $9
  • Jul24
    What Is the Metaverse? $9
  • Jul24
    10 Ways AI Can Help Organizations Tackle Cyberattacks $9
  • Jul25
    5 Tips for Managing Linux User Accounts $9
  • Jul25
    Hiring Kit: Virtual Reality Designer $9
  • Jul25
    Video Surveillance Policy $9
  • Jul25
    Quick Glossary: Spacetech $9
  • Jul29
    How to Build an Effective Security Operations Center $9
  • Jul29
    Anti-Money Laundering Policy $9
  • Jul29
    Quick Glossary: Fintech $9
  • Jul29
    Top 8 Linux Commands for User Management $9
  • Jul30
    10 Things You Should Know about Hiring a Business or Systems Analyst FREE
  • Jul30
    Environmental Policy $9
  • Jul30
    Quick Glossary: Edtech $9
  • Jul30
    Top 10 Artificial Intelligence Use Cases $9
  • Jul31
    Anti-Discrimination Policy $9
  • Jul31
    Quick Glossary: Greentech $9
  • Jul31
    GDPR Consent Request Forms: Sample Text $9
  • Jul31
    Hiring Kit: Back-End Developer $9
  • Aug1
    What Is the Public Cloud? $9
  • Aug1
    Top Reasons Why Employees Say They're Using AI at Work $9
  • Aug5
    Hiring Kit: Site Reliability Engineer $9
  • Aug5
    Data Migration Testing Checklist $9
  • Aug5
    Quick Glossary: Web 3.0 $9
  • Aug6
    What Is Facial Recognition Software? $9
  • Aug6
    10 Ways to Avoid Mistakes during Project Development FREE
  • Aug6
    Internet Resource Access Policy $9
  • Aug7
    Hiring Kit: Mobile Application Developer $9
  • Aug7
    Will Power Availability Derail the AI Revolution? $9
  • Aug7
    What Is Open Source? $9
  • Aug8
    Generative AI Policy $9
  • Aug8
    Benefits of Adopting Zero-Trust Security $9
  • Aug8
    Hiring Kit: SQL Developer $9
  • Aug9
    Remote Device Management and Wiping Policy $9
  • Aug9
    Quick Glossary: Agritech $9
  • Aug12
    Multi-Factor Authentication Policy $9
  • Aug12
    What Is Generative AI? $9
  • Aug12
    How Organizations Can Prevent Their Employees Falling for Cyber Scams $9
  • Aug13
    Benefits of APIs in Software Development $9
  • Aug13
    What Is Artificial General Intelligence? $9
  • Aug13
    10 Efficient Ways to Produce Useful Metrics FREE
  • Aug14
    Data Governance Policy $9
  • Aug14
    AI: Where Is the Faster Return on Investment? $9
  • Aug14
    What Is ESG? $9