Instant Messaging Spam Reports

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Trend Watch: CIO trends
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on CIO trends in the Asia-Pacific region, Computer Weekly looks at predictions for 2023, how the Australian Red Cross managed a donation surge, Mondelez's digital transformation and Singapore's public sector IT strategy.
Posted: 19 Jan 2023 | Published: 19 Jan 2023

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity trends for 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.
Posted: 16 Jan 2023 | Published: 17 Jan 2023

TechTarget ComputerWeekly.com

How a Unified Data Cloud Boosts Simplicity and Intelligence for Better Business Outcomes
sponsored by Google Cloud & AMD
WEBCAST: Watch this webinar to hear from a panel of experts from IDC, Google Cloud, and partners discuss how they are putting data, analytics, and the power of artificial intelligence to work via the cloud.
Posted: 20 Dec 2022 | Premiered: Dec 20, 2022

TOPICS:  IT Management
All resources sponsored by Google Cloud & AMD

The ultimate guide to Robotic Process Automation (RPA)
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Robotic process automation is a hot commodity in today's enterprises -- its impact has been described as transformational and disruptive. Still, RPA software is not without risks. In this e-guide, we explain everything you need to know for a successful RPA implementation, from the basics to analysis of where this rapidly evolving market is headed.
Posted: 06 Apr 2022 | Published: 06 Apr 2022

TechTarget ComputerWeekly.com

2022 ANZ Salary Survey - Future Work Infographic
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: The results are in for the 2022 Career and Salary Survey. With over 200 respondents who work in the ANZ IT sector, this infographic will give you a snapshot of what was the impact of the pandemic on IT staff, how working arrangements have changed and which topics have become a life priority for those working in tech.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

MicroScope – February 2023: Opportunities in security
sponsored by MicroScope
EZINE: In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it
Posted: 31 Jan 2023 | Published: 01 Feb 2023

MicroScope

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
Posted: 30 May 2022 | Published: 31 May 2022

TechTarget ComputerWeekly.com

Royal Holloway: Security evaluation of network traffic mirroring in public cloud
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series examines network traffic mirroring, demonstrating how the technique is being implemented in public cloud and the challenges it faces due to the inherent characteristics of the public cloud – security challenges that, if not addressed, can be detrimental to the security posture of an enterprise.
Posted: 27 Apr 2022 | Published: 27 Apr 2022

TechTarget ComputerWeekly.com