IT Training Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

CW Europe – September 2018: Costs stack up for Dutch government IT projects
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue of CW Europe, we look at analysis by a Dutch newspaper which discovered that government-controlled IT projects in the Netherlands go over budget by 40%, on average. We also find out how Berlin's Digital Career Institute is building web skills among refugees and the unemployed across Germany.
Posted: 08 Feb 2021 | Published: 14 Sep 2018

TechTarget ComputerWeekly.com

2023 IT Salary & Career Survey
sponsored by TechTarget ComputerWeekly.com
LANDING PAGE: Our IT Salary & Career Study is now underway and we need your help to determine the current trends in employment & salaries. As a valued Computer Weekly member, you're invited to share your experience by completing this survey. It only takes a few minutes to complete and you'll also be one of the first to receive a detailed survey report.
Posted: 23 Feb 2023 | Published: 24 Feb 2023

TechTarget ComputerWeekly.com

Tech career guide: Cyber security
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what it takes to make it in Asia-Pacific's cyber security industry.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

developerWorks Live! briefings
sponsored by IBM
RESOURCE CENTER: Attending one of the jam-packed IBM developerWorks Live! briefings will shorten your learning curve, and improve the quality and results of your most difficult software projects. Keep up-to-speed on the latest trends in the industry by signing up now for some of the most powerful briefings.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.

Agile Transformation Strategy
sponsored by CollabNet
WHITE PAPER: The CollabNet Agile Coaches have observed patterns and key milestones in the way organizations adopt and scale Agile. "Agile Transformation Strategy," by Angela Druckman, CollabNet Certified Scrum Trainer and Agile Transformational Coach, outlines a sound strategy and transformational "blueprint" to help guide organizations on the path to Agility.
Posted: 08 Apr 2011 | Published: 08 Apr 2011

CollabNet

Ensuring Long-Term Success of BI/Analytics Projects: Train and Train Again
sponsored by SAP America, Inc.
WHITE PAPER: BI solutions are fast becoming a mainstay for organizations that recognize that proper collection and analysis of information can improve critical business processes. This paper provides key evaluation concerns for organizations looking to implement comprehensive training to ensure the success of their enterprise BI projects.
Posted: 20 Sep 2010 | Published: 20 Sep 2010

SAP America, Inc.

CW EMEA - June 2023: IT budgets buck trend
sponsored by TechTarget ComputerWeekly.com
EZINE: Despite gloomy economic conditions worldwide, IT leaders in EMEA expect budgets to increase this year, according to TechTarget/Computer Weekly's IT Priorities survey. We also look at how health authorities in the UAE are modernising healthcare services, how Finland and Estonia are sharing expertise, and how the Dutch government is addressing bias.
Posted: 08 Jun 2023 | Published: 08 Jun 2023

TechTarget ComputerWeekly.com

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget