• Downloads
    August 2019 by TechRepublic Premium
    Appropriate asset controls are important in order to safeguard the business while providing employees the use of assets needed to do their jobs. These controls ensure assets are managed and tracked in a routine fashion to reduce risk and unnecessary...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Successfully finding and recruiting suitable candidates for Security Analyst requires a well thought out plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate for Security Analyst in...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    A cryptographer uses their expertise in mathematics and computer science to develop algorithms, ciphers, and other encryption systems to protect sensitive data. It can be a difficult position to fill. Using this hiring kit as a template you can find,...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Moonlighting, the practice of working for another organization in a separate job in addition to one’s current employment, is a fairly common practice these days. It’s especially frequent in technology where people with varying skills and backgrounds may find their...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Recruiting candidates with advanced software engineering experience and a least some familiarity with applied blockchain technology will take time and effort. This hiring kit provides a workable framework you can use to find, recruit, and ultimately hire the best candidate...
    Download Now
  • Downloads
    August 2019 by TechRepublic Premium
    Finding and recruiting qualified candidates for an open computer vision engineer position will take time and concerted effort backed by a solid plan of action. This hiring kit provides a workable framework you can use to find, recruit, and ultimately...
    Download Now
  • Downloads
    July 2019 by TechRepublic Premium
    This policy provides guidelines for the delegation of user privileges on organization-owned systems. It also provides guidance for usage of high-privilege or administrator accounts. From the policy: SUMMARY The risk potential of running user-initiated tasks using the same access levels...
    Download Now
  • Downloads
    July 2019 by TechRepublic Premium
    The purpose of this policy is to provide guidelines for the appropriate use of ethics involving artificial Intelligence. This policy can be customized as needed to fit the needs of your organization. From the policy: SUMMARY The use of artificial...
    Download Now
  • Downloads
    June 2019 by TechRepublic Premium
    It's now much easier for enterprises to take a multicloud approach, which offers such benefits as avoiding vendor lock-in and competitive pricing, to name a few. Has managing multiple cloud providers become the new default for enterprise computing? A TechRepublic...
    Download Now
  • Downloads
    June 2019 by TechRepublic Premium
    The typical job duties of a computer forensic analyst involve the examination of electronic equipment ranging from basic USB flash drives to entire enterprise IT infrastructures. Whether it is a personal computer, smartphone, or encrypted hard drive, the analyst’s job...
    Download Now