Continuing Education Reports

Business email compromise prevention tips
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
Posted: 15 Mar 2023 | Published: 16 Mar 2023

TechTarget ComputerWeekly.com

Digital Disruption Index: Aligning strategy, workforce and technology
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Business leaders' confidence in the digital capabilities of new entrants to the workplace has improved in the past six months, according to the Digital Disruption Index by Deloitte.
Posted: 08 Feb 2021 | Published: 14 Jan 2019

TechTarget ComputerWeekly.com

Four EHR Change Management Mistakes (And How to Avoid Them)
sponsored by HP & Intel®
WHITE PAPER: The question is no longer if your healthcare practice will make the transition to EHR, but when.  Careful planning and effective change management can help keep missteps – and the stress and costs that come with them – to a minimum.  This white paper presents strategies for avoiding common EHR implementation problems.
Posted: 01 Aug 2013 | Published: 16 Sep 2011

HP & Intel®

Information Security Asean March 2016
sponsored by TechTarget
EZINE: Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Planning a Career Path in Cybersecurity
sponsored by Global Knowledge
WHITE PAPER: The need for personnel knowledgeable and experienced in security implementation and management has never been greater, and the need is growing.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Global Knowledge

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

Paving the Way to a Successful Upgrade Project
sponsored by SAP America, Inc.
PRODUCT LITERATURE: The SAP Upgrade Assessment for SAP ERP service delivers the expert advice and assistance you need to upgrade to a new release of the SAP ERP application. Read this whitepaper to learn which of the four different options is right for you.
Posted: 06 Aug 2008 | Published: 01 Jan 2007

SAP America, Inc.

Virtual Data Center eZine - Volume 4
sponsored by Virtual Data Center eZine - Volume 4
WHITE PAPER: This e-zine issue explains the direct benefits of implementing a SAP virtualization plan. It compares virtualization platforms, highlights common problems, and offers tips to leverage hardware-assisted memory virtualization.
Posted: 20 Aug 2008 | Published: 18 Aug 2008

All resources sponsored by Virtual Data Center eZine - Volume 4

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise