Secure Equipment Repair Policy and Confidentiality Agreement

Organizations must frequently work with third parties to repair laptops, desktops, tablets, smartphones, servers and other IT equipment. This policy from TechRepublic Premium ensures that the organization maintains regulatory... Read more »

How to Create and Use a Docker Secret From a File (+Video)

In this step-by-step tutorial, learn how to create and use a Docker secret to help keep your data secure. Read more »

How to Create and Use a Docker Secret From a File

Learn how to create and use a Docker secret from a file for secure storage of sensitive data with this step-by-step tutorial. Read more »

macOS Tune-Up Checklist

Macs, like Windows computers, benefit from routine maintenance. Regular tune-ups help protect Macs, both desktop and laptop models, from potential data loss, needlessly slow performance and other issues. Just... Read more »

White Hat Hackers Discover Microsoft Leak of 38TB of Internal Data Via Azure Storage

The Microsoft leak, which stemmed from AI researchers sharing open-source training data on GitHub, has been mitigated. Read more »

Google Reveals Combined SIEM and SOAR Update for Chronicle Security Operations Platform

Users of the SecOps platform can preview Duet AI’s natural language questions and summarization capabilities. Read more »

CISA Aims For More Robust Open Source Software Security for Government and Critical Infrastructure

The agency’s roadmap outlines a plan for prioritizing where open source software makes infrastructure potentially vulnerable. Read more »

What Does Closed-Door Meeting With AI Industry Leaders Mean for Business?

Businesses should plan for the development of AI regulation in the US, but knowing what it will look like is still a challenge. Read more »

Remote Access Checklist

This Remote Access Checklist from TechRepublic Premium should be used to ensure all employees have the requisite items, accounts, access and instructions needed for remote work. It should be... Read more »

Zero-Day Security Vulnerability Found in Chrome, Firefox and Other Browsers

Updates are now available to patch a Chrome vulnerability that would allow attackers to run malicious code. Read more »
Subscribe to our Newsletter