Instruction Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Step Up to Cisco Premier
sponsored by Comstor
WHITE PAPER: Access this one-page resource to learn about Step Up to Cisco Premier, a unique training that can help your associates receive the Cisco Premier certification so you can identify your company as a qualified, trained, and experienced Cisco resource.
Posted: 08 Feb 2012 | Published: 27 Jan 2012

Comstor

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Virtual Firsthand Training – A New Dimension of SAP® Education
sponsored by SAP America, Inc.
WHITE PAPER: This paper describes how new virtual learning options from the SAP® Education organization fulfill the requirements of many companies and consultants. Continue reading to learn how they reduce training investments, meet various needs, and offer a flexible learning approach.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

BYOD Security Policy Considerations and Best Practices
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com unveils best practices for creating your enterprise's bring your own device (BYOD) policy and steps you should take to ensure access and freedom for your employees without sacrificing corporate security and control.
Posted: 26 Nov 2012 | Published: 26 Nov 2012

TechTarget Security

Overcoming the Challenges of Green Procurement through eProcurement
sponsored by Dimension Data Global
WHITE PAPER: This eBook discusses nine eProcurement best practices. It also demonstrates how they will help you reduce environmental waste while implementing and managing your Green purchasing program.
Posted: 30 Sep 2008 | Published: 26 Sep 2008

Dimension Data Global

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Informal Learning: Extending the Impact of Enterprise Ideas and Information
sponsored by Adobe
WHITE PAPER: Forward-thinking organizations are turning to enterprise learning in their quest to be better informed, better skilled, better supported at the point of need, and more competitive in their respective marketplaces.
Posted: 10 Apr 2008 | Published: 01 Apr 2007

Adobe

Smarter Planet Industry Solutions technical podcast series: Season 1
sponsored by IBM
PODCAST: Welcome to the IBM developerWorks Smarter Planet Industry Solutions technical podcast series, your source for technical discussions regarding IT solutions for your industry. Tune in every few weeks to hear a new expert discussion.
Posted: 21 Dec 2011 | Premiered: Oct 21, 2011

IBM