Search Results for: bank fraud detection

E-Guide: Monitoring Strategies for Insider Threat Detection
In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

IBM

8 big data use cases for businesses and industry examples
For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.

TechTarget ComputerWeekly.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.

MarkMonitor

The currency of trust: why banks and insurers must make customer data safer and more secure
Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.

TechTarget ComputerWeekly.com

The Future of AI in Financial Services Security
Learn how simple machine learning and automation can keep your financial services organization secure from fraud.

TOPICS: Security
Innovecs LLC

Five Trends to Track in E-Commerce Fraud
This paper outlines five troubling trends in e-commerce fraud, and offers some guidance on how you can mitigate the risk they present to your business.

ThreatMetrix

Presentation Transcript: Phishing and the Underground Economy
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.

MarkMonitor

CW Europe - December 2020-February 2021: Tour de France fans get a virtual experience
The organisers of this year's Tour de France worked with technology services company NTT in partnership with Amaury Sport Organisation to provide what they described as an "enhanced experience" for race fans who could not be at the roadside because of Covid restrictions.

TechTarget ComputerWeekly.com

Computer Weekly - 15 May 2012: Overhauling banking IT
This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?

TechTarget ComputerWeekly.com

Take Back the Endpoint
During the course of three days in late 2009, cybercriminals acquired the banking credentials,username and password, for Hillary Machinery, Inc., located in Plano, Texas, and conducted more than 45 separate transactions to over 40 different payees. The result was a loss of $801,495.

Kaspersky