Business of Information Technology  >   Business Management  >   Human Resources Management  >  

IT Training

RSS Feed   
IT Training Reports
 
Royal Bank of Scotland Reduces Phishing Susceptibility
sponsored by Proofpoint
CASE STUDY: The Royal Bank of Scotland (RBS) recognized that its email users presented a significant attack surface. As they began experiencing phishing attacks, RBS saw the need to educate their employees on the damage phishing attacks can cause. In this case study, learn how RBS was able to do this using Proofpoint Security Awareness Training.
Posted: 05 Jun 2019 | Published: 28 Feb 2019

Proofpoint

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

CW ANZ August 2016
sponsored by SearchDataCenter.com
EZINE: In this month's CW ANZ e-zine, analyze the impact of a cloud failure in Australia and it forced enterprises to take heads out of sand and focus on business-continuity strategies. Also, you'll learn how Domain raises its game with the public cloud, why New Zealand calls for tech specialists, and more.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

SearchDataCenter.com

Digital Disruption Index: Aligning strategy, workforce and technology
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

ComputerWeekly.com

Maximising automation and the industrialisation of IT
sponsored by ComputerWeekly.com
ANALYST REPORT: This report from analysts Bob Tarzey and Clive Longbottom makes the case for automation in IT operations management.
Posted: 18 Feb 2013 | Published: 05 Dec 2012

ComputerWeekly.com

Strategic IT
sponsored by ComputerWeekly.com
BOOK: Find out how two leading CIOs have enabled their organisations to use information technology as strategic driver, in this extract from the book Strategic IT.
Posted: 19 May 2014 | Published: 19 May 2014

ComputerWeekly.com

Windows Server 2012 Security from End to Edge and Beyond
sponsored by ComputerWeekly.com
BOOK: This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

E-Book: Virtualizing Your Infrastructure Chapter 2: Virtualization Management Strategies and Guidelines
sponsored by SearchDataCenter.com
EBOOK: Get an analysis of challenges that accompany server virtualization, and strategies to address them.
Posted: 07 Mar 2013 | Published: 31 Dec 2012

SearchDataCenter.com

Computer Weekly – 16 December 2014: MPs give Post Office the cold shoulder
sponsored by Intel Corporation
EZINE: In this week's Computer Weekly we revisit subpostmaster grievances with the Post Office's IT. Despite years of allegations that the Horizon transaction processing system was at fault for many accounting shortfalls, the Post Office unrelentingly defended it. Read the issue now.
Posted: 12 Dec 2014 | Published: 12 Dec 2014

Intel Corporation

Information Security Asean July 2015
sponsored by TechTarget ANZ
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement