Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • The White House press conference podium.
    Image: Maksym Yemelyanov/Adobe Stock
    Security

    White House Launches Cybersecurity Implementation Plan

    The White House has announced the first iteration of the National Cybersecurity Implementation Plan. Read on to learn more about the plan and alignment with the five essential pillars.

    Karl Greenberg
    Published:  July 14, 2023, 1:55 PM EDT Modified:  July 14, 2023, 1:55 PM EDT Read More See more Security
  • A chief information security officer looking at many screens.
    Image: Gorodenkoff/Adobe Stock
    Security

    Gartner: Due to stress, half of cyber leaders will change jobs, and a quarter will quit the field

    Among the strategic propositions in Gartner's 2023-2024 cybersecurity outlook are that organizations need to institute cultural changes to lower pressure on security teams.

    Karl Greenberg
    Published:  July 13, 2023, 3:19 PM EDT Modified:  July 13, 2023, 3:19 PM EDT Read More See more Security
  • A sign with the Watson and IBM logos.
    Image: MichaelVi/Adobe Stock
    Artificial Intelligence

    IBM Launches New WatsonX Foundation Models for Enterprise

    With the launch of watsonx.ai and watsonx.data, the company is creating a platform approach to an AI workbench, allowing customers to deploy IBM, open-source or their own AI models.

    Karl Greenberg
    Published:  July 12, 2023, 12:50 PM EDT Modified:  July 12, 2023, 12:50 PM EDT Read More See more Artificial Intelligence
  • Laptop computer displaying logo of Upwork.
    Image: Adobe Stock
    Artificial Intelligence

    Upwork Launches New Generative AI Tools and Services Hub

    Upwork is launching a new generative AI tools and services hub. Discover more about Upwork's latest news with our article.

    Karl Greenberg
    Published:  July 11, 2023, 10:39 AM EDT Modified:  July 14, 2023, 10:38 AM EDT Read More See more Artificial Intelligence
  • Logo of EDM Council’s CDMC framework.
    Image: EDM Council
    Security

    EDM Council Survey: Management of Cloud Data Deployment is Lacking

    The Council’s first benchmark found that 84% of companies have not implemented ethical access, use and outcome policies and procedures per their cloud agendas.

    Karl Greenberg
    Published:  July 7, 2023, 2:50 PM EDT Modified:  July 7, 2023, 2:50 PM EDT Read More See more Security
  • The Thales logo on an office building.
    Image: Adobe Stock/Florence Piot
    Security

    Thales: For Data Breaches, Cloud Assets are Biggest Cybersecurity Headache

    Thales cloud security study shows that 79% of organizations have more than one cloud provider and 75% of companies said they store at least 40% of their sensitive data in the cloud.

    Karl Greenberg
    Published:  July 5, 2023, 5:29 PM EDT Modified:  July 5, 2023, 5:29 PM EDT Read More See more Security
  • Global cloud security image concept.
    Image: UnderhilStudio/Shutterstock
    Security

    Gigamon’s Cloud Security Report Shares Insights on Undetected Breaches & Deep Observability

    Global survey shows why you fear what you can't see: Confidence in security posture soars but so do worries about unseen vulnerabilities.

    Karl Greenberg
    Published:  June 30, 2023, 1:47 PM EDT Modified:  June 30, 2023, 3:39 PM EDT Read More See more Security
  • Cyber alert attack on the computer.
    Image: tippapatt/Adobe Stock
    Security

    Aqua Security Study Finds 1,400% Increase in Memory Attacks

    Analysis of 700,000 real-world attacks shows how memory attacks evade protections and suggest mitigations.

    Karl Greenberg
    Published:  June 30, 2023, 12:29 PM EDT Modified:  June 30, 2023, 12:29 PM EDT Read More See more Security
  • Ttwo male IT support agents working together in a dark network server room.
    Image: Siphosethu Fanti/peopleimages.com/Adobe Stock
    Cloud Security

    Engineering PCs, Other Devices Most at Risk for Security Vulnerabilities

    New research on operational technology vulnerabilities by Armis found that 56% of engineering workstations have at least one unpatched critical severity.

    Karl Greenberg
    Published:  June 28, 2023, 7:44 AM EDT Modified:  June 28, 2023, 7:44 AM EDT Read More See more Cloud Security
  • A virtual key icon hovers over phone during login.
    Image: tete_escape/Adobe Stock
    Security

    How FIDO2 Powers Up Passkeys Across Devices

    The FIDO Alliance’s Andrew Shikiar explains how passkeys are quickly replacing passwords as the next-generation login, a low friction, high security protocol for any device.

    Karl Greenberg
    Published:  June 27, 2023, 3:51 PM EDT Modified:  June 28, 2023, 9:12 AM EDT Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
114 results

TechRepublic Premium

  • TechRepublic Premium

    New User Education Checklist

    This checklist is designed to help you ensure that new employees have been trained on all the systems, software and devices they’ll be working with. You can tweak the entries in the various sections to match your needs. Where TechRepublic Premium offers a sample corporate policy, we’ve included a link to the download. Previously priced ...

    Downloads
    Published:  July 16, 2023, 4:00 PM EDT Modified:  July 17, 2023, 8:14 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    ACH Payment Process Policy

    This ACH payment process policy from TechRepublic Premium describes the procedures an organization and its representatives must use when paying any approved invoice from authorized vendors, suppliers, consultants, contractors, government agencies, or other authorized products, services or tax authorities via a manual electronic payment. This policy can be customized as needed to fit the needs ...

    Published:  July 16, 2023, 4:00 PM EDT Modified:  July 17, 2023, 8:25 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring Kit: Virtual Reality Designer

    This hiring kit from TechRepublic Premium contains a job description, sample interview questions and a basic want ad to help you find the best candidates for a virtual reality designer position. From the hiring kit: INTRODUCTION While the concept of virtual and augmented reality applications has been around for decades, the technological ability to render ...

    Downloads
    Published:  July 13, 2023, 4:00 PM EDT Modified:  July 14, 2023, 8:13 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Accomplishment Tracker

    Having a structured way to keep track of your noteworthy accomplishments will help you be at your best when review time rolls around. It can also help with ideas when you’re feeling stuck trying to revise your resume. That’s where TechRepublic Premium can help with this guide and accompanying worksheet. Add information to the worksheet ...

    Published:  July 12, 2023, 4:00 PM EDT Modified:  July 13, 2023, 8:41 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice