Search Results for: bank fraud detection

E-Book: Strategic guide to insider threat detection and breach response
Data loss by insiders poses a significant threat to enterprises, so it's critical to have a plan in place to detect, prevent or mitigate the behaviors of malicious insiders. This expert e-book discusses strategies for implementing insider threat detection tools and provides 10 simple steps for building a robust security breach response plan.

TechTarget Security

The Ultimate Guide to Online Fraud Prevention
According to a recent study, account takeover attacks are up 131%. An effective counter-fraud strategy must focus on higher-level principles rather than implementation details, outlining the general principles for adopting, maintaining, and reinforcing counter-fraud measures through technology. Read on to learn more.

TOPICS: .NET
Ping Identity Corporation

Compliant Statement Archiving and Presentment for Financial Services
Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.

EMC Corporation

Database Security Audit and Protect Critical Databases
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.

Imperva

The Cybercrime Arms Race
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

Kaspersky

Online Dating: Keeping Your Members Safe from Online Scams and Predators
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.

iovation, Inc.

IBM Intelligent Investigation Manager
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.

IBM

SWIFT Security Controls to be Mandatory by 2018
Take a look at this e-guide to uncover experts' perspectives about the SWIFT security control mandate with inspections and enforcement beginning January 1, 2018.

CyberArk

Network Security: Spotlight on Australia/New Zealand
In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

TechTarget ComputerWeekly.com

Drawing business value from GRC analytics
In this handbook, learn how companies are drawing business value from GRC analytics data and developing strategies to incorporate analytics best practices that benefit company-wide business processes.

TechTarget Security