Search Results for: bank fraud detection

Infographic: Business email compromise red flags
Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

TechTarget ComputerWeekly.com

Fraud Prevention and Detection for Credit and Debit Card Transactions
Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.

IBM

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.

iovation, Inc.

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.

iovation, Inc.

Best Practices for Preventing Malware
Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.

TechTarget Security

AI in Fraud Management: Uses cases, benefits and challenges
AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.

TechTarget ComputerWeekly.com

Traditional Threat Management vs. AI-Driven Threat Intelligence
As traditional antivirus programs and intrusion detection systems become ineffective against ransomware and advanced persistent threats, it’s become imperative for organizations to take proactive approaches – such as AI-driven threat intelligence. Take the survey to access Traditional Threat Management vs. AI-Driven Threat Intelligence.

Bottomline Technologies, Inc.

Making a Business Case for Fraud Prevention Technology
This guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.

IBM

Client Case Study: Bouyges Telecom
In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.

IBM

Nordic banking in the digital age
Read in this e-guide how Nordic banks are working together to make cross border payments in the region seamless. Also find out how Nordic banks are offering customers the opportunity to make payments via wearable devices and how the region's successful mobile payments platform, MobilePay, is futureproofing its business.

TechTarget ComputerWeekly.com