Education Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly – 9 May 2017: Casting the IT skills net wider
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as research reveals that three-quarters of non-tech workers would be interested in a job in IT, we examine what's stopping them. We analyse the key storage elements of building a private cloud. And Bloomberg's head of data science talks about the benefits of machine learning. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 May 2017

TechTarget ComputerWeekly.com

Reducing Total Cost of Ownership: Delivering Cost Effective Enterprise Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This white paper explains how MicroStrategy's enterprise strength, scalable platform and self-service technology enable organizations to achieve pervasive BI at the lowest industry ownership costs.
Posted: 09 Jun 2008 | Published: 01 Jun 2008

MicroStrategy

How to Solve Security Problems Within Your Organization
sponsored by Wisegate
EGUIDE: Access this e-guide for expert insight on the need for risk management, and why data protection alone isn't enough. Click now to explore how proper education will enable a more robust and knowledgeable IT security team.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

Wisegate

The Realities of Single Sign-On
sponsored by PistolStar, Inc.
WHITE PAPER: Single Sign-On has emerged as a significant technology that resolves a major issue for organizations with multiple platforms, servers and applications requiring unique usernames and passwords for access.
Posted: 13 Jun 2008 | Published: 01 Jan 2006

PistolStar, Inc.

SAP Travel Management at T-Com, eLearning for 140,000 Employees with datango
sponsored by datango AG
CASE STUDY: The IT department of T-Com Human Resources was faced with the challenge of training 140,000 employees to perform reporting processes for their own business travel as quickly as possible. Read this case study to find out how T-Com found their way to datango in their search for a customizable context sensitive online help system.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

datango AG

eGuide: Tackle SharePoint Sprawl and Implement Effective Training Strategies
sponsored by AvePoint, Inc.
EGUIDE: Read this E-Guide and uncover key SharePoint training techniques and strategies. Learn which factors can lead to SharePoint sprawl and how your organization can regain control of your SharePoint deployment.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

AvePoint, Inc.

Virgin Media Case Study: Virgin Media ignites productivity and collaboration with new learning and performance management system
sponsored by Cornerstone OnDemand
CASE STUDY: This case study explains how Virgin Media, a leading provider of broadband, TV, mobile phone and home phone services in the UK, was able to realize significant workforce gains with a cloud-based learning and performance management system.
Posted: 15 May 2013 | Published: 31 Dec 2012

Cornerstone OnDemand

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies