Instant Messaging Spam

Instant Messaging Spam Reports
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

2022 ANZ Salary Survey - Future Work Infographic
sponsored by ComputerWeekly.com
INFOGRAPHIC: The results are in for the 2022 Career and Salary Survey. With over 200 respondents who work in the ANZ IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.
Posted: 04 May 2022 | Published: 04 May 2022

ComputerWeekly.com

Media Consumption Survey 2022
sponsored by ComputerWeekly.com
LANDING PAGE: Information is a powerful tool for IT decision-makers, and we understand that our readers enjoy consuming media in many different ways. With this in mind, we are trying to gain a better understanding of what content types our readership values the most. By taking this survey, you will help us shape our content around your needs.
Posted: 18 May 2022 | Published: 18 May 2022

ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

11 Required Monitoring Platform Capabilities for Enterprise DevOps Teams eBook
sponsored by Datadog
WHITE PAPER: As DevOps teams work with an unprecedented volume of data, effective end-to-end monitoring is a key capability for any DevOps initiative. Here, explore the 11 required monitoring platform capabilities for enterprise DevOps teams. Download it here.
Posted: 10 Dec 2021 | Published: 21 Jan 2021

Datadog

2022 UKI IT Priorities Infographic: Pandemic Impact & Major Trends
sponsored by ComputerWeekly.com
EBOOK: Each year, Computer Weekly asks IT decision-makers what projects they have planned for the coming year. The effects of the global Covid-19 pandemic were evident in the 2022 TechTarget/Computer Weekly IT Priorities survey. To find out more about the results of this survey download the infographic here.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

ComputerWeekly.com

Royal Holloway: Attack mapping for the internet of things
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The introduction of each internet-connected device to a home network increases the risk of cyber attack. This article in our Royal Holloway security series presents a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it.
Posted: 13 May 2022 | Published: 13 May 2022

ComputerWeekly.com

A Better Replacement For The Incumbent Training Model
sponsored by CyberVista
BLOG: While cybersecurity bootcamps are popular ways to certify and train employees, they tend to lack competence testing and long-term skills retention. Explore this website post to learn how some online training models are conquering the shortcomings of the bootcamp model and discover how these training models map directly to your needs.
Posted: 17 Mar 2022 | Published: 31 Dec 2020

TOPICS:  Security
CyberVista

5 cybersecurity myths and how to address them
sponsored by ComputerWeekly.com
INFOGRAPHIC: Recent studies show that the lack of cybersecurity awareness is still the biggest detriment to an organization's cyber defences. Insufficient training and persistent misinformation are factors that can compromise a cybersecurity operation. In this infographic, we put together some of the top myths around cybersecurity and how you can address them.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

ComputerWeekly.com

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com