Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Image of Karl Greenberg

Karl Greenberg

Send Karl Greenberg an email

Latest from Karl Greenberg

  • A user typing a password.
    Image: Song_about_summer/Adobe Stock
    Security

    1Password is looking to a password-free future. Here’s why

    With phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to 'eliminate’ passwords entirely.

    Karl Greenberg
    Published: March 2, 2023, 3:44 PM EST Modified: March 4, 2023, 10:11 AM EST Read More See more Security
  • Concept of simulating cyber attack on software applications known as penetration testing, this illustrates how some of the cyber attacks can break the security systems through weak security standards, configuration and code
    Image: Vallepugraphics/Adobe Stock
    Security

    Pen testing report: IT budgets should focus on entire security stack

    With nearly 90% of companies reporting cyberattacks, pen testing budgets are on the rise, with cloud infrastructure and services a key focus area, according to a new report.

    Karl Greenberg
    Published: February 28, 2023, 2:05 PM EST Modified: February 28, 2023, 2:14 PM EST Read More See more Security
  • Scrabble tiles scattered in front of some glasses with a few standing up that spell out CVE
    Image: lexiconimages/Adobe Stock
    Security

    DLL sideloading and CVE attacks show diversity of threat landscape

    Studies from Bitdefender and Arctic Wolf show that new tactics are using twists on concealment in social media and old vulnerabilities in third-party software.

    Karl Greenberg
    Published: February 24, 2023, 10:59 AM EST Modified: February 24, 2023, 4:02 PM EST Read More See more Security
  • A cybersecurity worker identifies an issue.
    Image: leowolfert/Adobe Stock
    Tech & Work

    Report: Stress will drive a quarter of cyber defenders out the door

    There are too few cybersecurity experts to fill jobs, but a new study sees the crunch increasing through 2025 as cybersecurity experts head for the hills.

    Karl Greenberg
    Published: February 23, 2023, 3:16 PM EST Modified: February 23, 2023, 3:16 PM EST Read More See more Tech & Work
  • A keyboard with a cyber attack coming through a key that says backdoor.
    Image: Imillian/Adobe Stock
    Security

    IBM: Most ransomware blocked last year, but cyberattacks are moving faster

    A new study from IBM Security suggests cyberattackers are taking side routes that are less visible, and they are getting much faster at infiltrating perimeters.

    Karl Greenberg
    Published: February 22, 2023, 12:01 AM EST Modified: February 21, 2023, 6:52 PM EST Read More See more Security
  • The Creation of robot Adam
    Image: PayPau/Adobe Stock
    Artificial Intelligence

    Salesforce offers 5 guidelines to reduce AI bias

    The bias-reduction study guides companies in ways to build trust, safety and sustainability from their AI data stores and when to empower humans in the oversight of these models.

    Karl Greenberg
    Published: February 21, 2023, 3:46 PM EST Modified: February 22, 2023, 3:12 PM EST Read More See more Artificial Intelligence
  • A digital transformation turning data into a butterfly.
    Image: Shutter2U/Adobe Stock
    CXO

    Cisco CXO: Digital transformation means transforming customer outcomes

    Cisco’s Chief Customer Experience Officer Thimaya Subaiya discusses low-power chips that will empower next-generation IoT, how data centers can reach net zero goals, zero trust and more.

    Karl Greenberg
    Published: February 17, 2023, 1:52 PM EST Modified: February 17, 2023, 1:52 PM EST Read More See more CXO
  • An email attack visualization of a rusty hook catching an envelope.
    Image: RareStock/Adobe Stock
    Security

    Investigators uncover crypto scammers baiting ‘phish’ hooks on YouTube

    A report reveals a new network of malefactors in the lucrative crypto fraud market using videos, channels and web apps.

    Karl Greenberg
    Published: February 15, 2023, 1:53 PM EST Modified: February 15, 2023, 1:53 PM EST Read More See more Security
  • People standing in circles that are interconnected like a web
    Image: Picture Cells/Adobe Stock
    Tech & Work

    What Twitter’s outage says about (over) zealous downsizing

    The outage message that Twitter users got last week could be read as a warning for big tech firms looking to slash their IT workforce.

    Karl Greenberg
    Published: February 15, 2023, 9:33 AM EST Modified: February 21, 2023, 1:49 PM EST Read More See more Tech & Work
  • Internet technology network cyber security concept of protect computer virus attack with lock icon on network connectivity.
    Image: your123/Adobe Stock
    Security

    Check Point’s annual cybersecurity event spotlights power of AI

    The company showcased dozens of new security tools and services to detect and prevent malware, phishing, ransomware and other attacks, but AI took center stage.

    Karl Greenberg
    Published: February 13, 2023, 5:23 PM EST Modified: February 13, 2023, 5:23 PM EST Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • Next
36 results

TechRepublic Premium

  • TechRepublic Premium

    MSP best practices: PC deployment checklist

    For managed services providers, deploying new PCs and performing desktop and laptop migrations are common but perilous tasks. The adage “you’re only as good as your last performance” certainly applies. An MSP and its technicians can get everything right, complete a client’s complex cloud migrations, and perform remote work initiatives and proprietary business application upgrades, ...

    Provided By TechRepublic Premium Published: Feb 2023 Modified: Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    IT training policy

    Successful IT departments are defined not only by the technology they deploy and manage, but by the skills and capabilities of their people. IT workers must keep up to date with the latest technology trends and evolutions, as well as developing soft skills like project management, presentation and persuasion, and general management. Due to the ...

    Provided By TechRepublic Premium Published: Feb 2023 Modified: Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    MSP best practices: Network switch and router maintenance checklist

    Managed services providers often prioritize properly configuring and implementing client network switches and firewalls. However, regularly reviewing and updating such components is an equally important responsibility. It’s essential to ensure clients understand the necessity of regularly auditing, updating and creating new backups for network switches and routers as well as the need for scheduling the ...

    Provided By TechRepublic Premium Published: Feb 2023 Modified: Feb 2023 Read More
    View This Now
  • TechRepublic Premium

    Service level agreement policy

    A service level agreement is a proven method for establishing expectations for arrangements between a service provider and a customer. SLAs involve identifying standards for availability and uptime, problem response/resolution times, service quality, performance metrics and other operational concepts. SLAs streamline operations and allow both parties to identify a proper framework for ensuring business efficiency ...

    Provided By TechRepublic Premium Published: Feb 2023 Modified: Feb 2023 Read More
    View This Now

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice