Skip to content

TechRepublic

  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products Lists
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • cybersecurity
    Image: Getty Images/iStockphoto
    Cloud

    WithSecure launches ‘outcome-based’ security at Sphere23 conference

    At its Sphere23 event in Finland, security company WithSecure unveiled offerings focused on collaboration, business goals and outcomes.

    Karl Greenberg
    Published:  May 25, 2023, 1:49 PM EDT Modified:  May 25, 2023, 3:23 PM EDT Read More See more Cloud
  • A hook on a keyboard.
    Image: ronstik/Adobe Stock
    Security

    Spearphishing report: 50% of companies were impacted in 2022

    Barracuda Networks found that spearphishing exploits last year worked to great effect and took days to detect.

    Karl Greenberg
    Published:  May 24, 2023, 3:08 PM EDT Modified:  May 25, 2023, 7:16 AM EDT Read More See more Security
  • An AI hand and business person's hand touching a brain.
    Image: peshkova/Adobe Stock
    Innovation

    EY survey: Tech leaders to invest in AI, 5G, cybersecurity, big data, metaverse

    Generative AI is of particular interest to leaders for the benefits of cost savings, efficiency and effectiveness.

    Karl Greenberg
    Published:  May 23, 2023, 4:46 PM EDT Modified:  May 23, 2023, 11:17 PM EDT Read More See more Innovation
  • This illustration shows a lock, unlocked over a person at a keyboard.
    Image: Adobe Stock.
    Security

    How business email compromise attacks emulate legitimate web services to lure clicks

    New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft.

    Karl Greenberg
    Published:  May 19, 2023, 2:10 PM EDT Modified:  May 19, 2023, 2:23 PM EDT Read More See more Security
  • A person holding up their phone with the Okta logo on it in front of a page on the Okta website for Authentication
    Image: Timon/Adobe Stock
    Security

    Okta’s Security Center opens window to customer insights, including threats and friction

    Okta's Security Center, now generally available, uses the company's Customer Identity Cloud for insights into authentication activity for insights into anomalies, threats and security friction.

    Karl Greenberg
    Published:  May 18, 2023, 3:25 PM EDT Modified:  May 19, 2023, 6:18 PM EDT Read More See more Security
  • Exterior view of IBM sign at IBM Canada Head Office on May 16, 2018 in Markham, Ontario, Canada.
    Image: JHVEPhoto/Adobe Stock
    Security

    IBM snags Polar Security to boost cloud data practice

    IBM acquired the Israeli firm founded in 2021 to grow its relevance in the nascent realm of data security posture management, or DSPM.

    Karl Greenberg
    Published:  May 16, 2023, 6:20 PM EDT Modified:  May 18, 2023, 1:20 PM EDT Read More See more Security
  • A phone with the Palo Alto Networks logo above a screen that says cyber security.
    Image: Rafael Henrique/Adobe Stock
    Cloud

    Sticking to traditional security playbook is mistake for cloud security: Palo Alto Networks SVP

    Ankur Shah of Palo Alto Networks’ Prisma Cloud security platform says he sees a bright future for AI in security operations, but not so much for DevOps using many tools with little left-to-right integration.

    Karl Greenberg
    Published:  May 16, 2023, 5:25 PM EDT Modified:  May 17, 2023, 1:08 PM EDT Read More See more Cloud
  • A data leader reviews data visualizations.
    Image: fizkes/Adobe Stock
    Cloud

    Splunk report sees upsides to observability

    Splunk’s third annual observability report shows how a comprehensive view of systems lowers costs, cuts downtime and reduces security risks.

    Karl Greenberg
    Published:  May 16, 2023, 1:44 PM EDT Modified:  May 16, 2023, 1:44 PM EDT Read More See more Cloud
  • Gusto vs Quickbooks.
    Image: Rebecca Olason/TechRepublic
    Software

    Gusto vs QuickBooks Payroll: Which Software Is Better for 2023?

    Payroll processing can be painful for SMBs. Luckily, there are highly versatile, subscription-based software services in the cloud. We look at two of the best: Gusto and QuickBooks Payroll.

    Karl Greenberg
    Published:  May 16, 2023, 9:47 AM EDT Modified:  May 22, 2023, 7:48 AM EDT Read More See more Software
  • email security.
    Image: Getty Images/iStockphoto/Balefire9
    Security

    Israel-based threat actors show growing sophistication of email attacks

    Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur payments for fake acquisitions.

    Karl Greenberg
    Published:  May 15, 2023, 6:34 PM EDT Modified:  June 12, 2023, 3:37 PM EDT Read More See more Security
  • Prev
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
114 results

TechRepublic Premium

  • TechRepublic Premium

    Personnel Screening Policy

    Personnel screening involves analyzing the background of company applicants to ensure that they are a creditable fit for the role in which they intend to work. The process may entail analysis of criminal records, credit history, employment/academic verifications, job skills and other criteria. This policy from TechRepublic Premium provides a framework for building a screening ...

    Published:  July 16, 2023, 4:00 PM EDT Modified:  July 17, 2023, 8:57 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    New User Education Checklist

    This checklist is designed to help you ensure that new employees have been trained on all the systems, software and devices they’ll be working with. You can tweak the entries in the various sections to match your needs. Where TechRepublic Premium offers a sample corporate policy, we’ve included a link to the download. Previously priced ...

    Downloads
    Published:  July 16, 2023, 4:00 PM EDT Modified:  July 17, 2023, 8:14 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    ACH Payment Process Policy

    This ACH payment process policy from TechRepublic Premium describes the procedures an organization and its representatives must use when paying any approved invoice from authorized vendors, suppliers, consultants, contractors, government agencies, or other authorized products, services or tax authorities via a manual electronic payment. This policy can be customized as needed to fit the needs ...

    Published:  July 16, 2023, 4:00 PM EDT Modified:  July 17, 2023, 8:25 AM EDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Hiring Kit: Virtual Reality Designer

    This hiring kit from TechRepublic Premium contains a job description, sample interview questions and a basic want ad to help you find the best candidates for a virtual reality designer position. From the hiring kit: INTRODUCTION While the concept of virtual and augmented reality applications has been around for decades, the technological ability to render ...

    Downloads
    Published:  July 13, 2023, 4:00 PM EDT Modified:  July 14, 2023, 8:13 AM EDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice