• Hiring Kit: Security Analyst

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in your organization. From the hiring kit INTRODUCTION For most modern...

    Download Now
  • Hiring kit: Cryptographer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find, recruit, and hire the best cryptographer candidate for your business....

    Download Now
  • Moonlighting policy

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their abilities in demand by multiple companies and in need of...

    Download Now
  • Hiring kit: Blockchain Engineer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Blockchain Engineer in your organization. From the Hiring kit...

    Download Now
  • Hiring kit: Computer Vision Engineer

    Downloads · Aug 2019 · Provided By TechRepublic Premium

    Finding and recruiting qualified candidates for an open Computer Vision Engineer position will take time and concerted effort backed by a solid plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for your organization. From the hiring...

    Download Now
  • User privilege policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels as components of the operating system is staggeringly high, particularly...

    Download Now
  • Artificial intelligence ethics policy

    Downloads · Jul 2019 · Provided By TechRepublic Premium

    The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization. From the policy: SUMMARY The use of artificial intelligence and machine learning is on the rise in many...

    Download Now
  • Managing the multicloud: Companies capitalize on using multiple cloud providers

    Downloads · Jun 2019 · Provided By TechRepublic Premium

    It's now much easier for enterprises to take a multicloud approach, which offers such benefits as avoiding vendor lock-in and competitive pricing, to name a few. Has managing multiple cloud providers become the new default for enterprise computing? A TechRepublic Premium online survey wanted to find out. The survey asked...

    Download Now
  • WWDC 2019: A guide for business pros

    Downloads · Jun 2019 · Provided By TechRepublic Premium

    Apple’s annual Worldwide Developers Conference (WWDC) kicked off on June 3 in San Jose, with a keynote presentation from Apple executives announcing a number of new software and hardware updates. Apple CEO Tim Cook and other executives announced significant feature updates and new versions of the company’s operating systems to...

    View This Now
  • Mobile device security policy

    Downloads · Jun 2019 · Provided By TechRepublic Premium

    More and more users are conducting business on mobile devices. This can be due to increases in remote workers, travel, global workforces, or just being on-the-go. This policy provides guidelines for mobile device security needs in order to protect businesses and their employees from security threats. From the policy Summary...

    Download Now