Instant Messaging Spam Reports

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

CW EMEA July 2023: Can we trust AI?
sponsored by TechTarget ComputerWeekly.com
EZINE: Artificial intelligence and the opportunities and dangers it introduces into society has been a hotly debated subject in tech circles for many years, but today with the increased use of platforms such as ChatGPT, these debates include a wider section of the public.
Posted: 12 Jul 2023 | Published: 13 Jul 2023

TechTarget ComputerWeekly.com

How Can Healthcare Protect Against Zero-Day Attacks and What Does It Mean?
sponsored by XtelligentMedia Healthcare
EGUIDE: Zero-day attacks pose significant dangers to the healthcare sector, but defenders can mitigate risk by patching early and often.
Posted: 08 Apr 2024 | Published: 08 Apr 2024

XtelligentMedia Healthcare

Computer Weekly Innovation Awards APAC 2024 - Nomination form
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
Posted: 30 Nov 2023 | Published: 01 Dec 2023

TechTarget ComputerWeekly.com

Log More to Improve Visibility and Enhance Security
sponsored by CrowdStrike
WHITE PAPER: ph
Posted: 22 Sep 2023 | Published: 22 Sep 2023

TOPICS:  Security
CrowdStrike

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Speed Up Your Software Development Cycle
sponsored by Slack
WHITE PAPER: Learn how to accelerate coding and deliver more software faster.
Posted: 20 Nov 2023 | Published: 20 Nov 2023

TOPICS:  IT Management
Slack

16 Ways Dell OpenManage Helps Your Business
sponsored by Dell Technologies & IntelĀ®
WHITE PAPER: Access this infographic that highlights the 16th generation of Dell PowerEdge servers with 16 examples of how OpenManage portfolio enhances server range.
Posted: 15 May 2024 | Published: 15 May 2024

TOPICS:  IT Management
Dell Technologies & IntelĀ®

Ten Ways to Replace Ineffective Meetings
sponsored by Slack
WHITE PAPER: How your business can increase productivity and cut costs by swapping meetings with asynchronous work and task automation.
Posted: 20 Dec 2023 | Published: 20 Dec 2023

TOPICS:  IT Management
Slack

2024 Generative AI Survey EMEA
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: Business stakeholders, IT professionals, data scientists, and end users continue to weigh the benefits, use cases, and best practices of generative AI (GenAI) against concerns with AI ethics and hallucinations. TechTarget's Enterprise Strategy Group aims to cut through this distracting noise, in our just-launched 2024 Generative AI Pulse Study.
Posted: 16 May 2024 | Published: 17 May 2024

TechTarget ComputerWeekly.com