Instant Messaging Spam Reports

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

MicroScope – July 2023: The pressure to deliver
sponsored by MicroScope
EZINE: With technology always changing, it can feel like an impossible feat to keep up – we speak to experts about how the channel handles rapid change and the pressure this places on partners to meet customer expectations. Also read about major themes of the market and how the topic of return on investments needs to stretch beyond economics
Posted: 06 Jul 2023 | Published: 07 Jul 2023

MicroScope

How to Have Productive Experiences for Your Employees
sponsored by ServiceNow
WHITE PAPER: An organization is only as strong as its employees. Read this paper to learn how the path to delivering productive employee experiences and supporting new ways of working begins with creating exceptional experiences.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  IT Management
ServiceNow

Speed Up Your Software Development Cycle
sponsored by Slack
WHITE PAPER: Learn how to accelerate coding and deliver more software faster.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

Making Employee Journeys Unforgettable
sponsored by ServiceNow
WHITE PAPER: Read this paper to learn how to eliminate common and repeated inquiries by giving employees a place to find their own answers, and provide an easy transition for those with more complex issues.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  IT Management
ServiceNow

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

U.S. FTC Safeguards Rule
sponsored by Cisco
WHITE PAPER: The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  Security
Cisco

Computer Weekly – 24 October 2023: Brewing data insights at Heineken
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how brewing giant Heineken is building a data ecosystem to share insights and tap into AI capabilities. The UK is conducting an investigation into cloud supplier dominance – what will it mean for users? And we examine how generative AI could be used to improve customer experience. Read the issue now.
Posted: 24 Oct 2023 | Published: 24 Oct 2023

TechTarget ComputerWeekly.com

Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER: ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023

TOPICS:  Security
CrowdStrike

Cyber-Resilient Infrastructure Starts with Server Security
sponsored by Dell Technologies & AMD
WHITE PAPER: In this White Paper, discover how Dell's PowerEdge servers combined with AMD's EPYC line or processors can keep your datacenter secure.
Posted: 16 May 2023 | Published: 16 May 2023

TOPICS:  Security
Dell Technologies & AMD