Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Computer Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Computer Fraud Multimedia (View All Report Types)
 
Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

Build the Intelligent, Integrated Enterprise
sponsored by Red Hat
WEBCAST: Watch this webcast to learn how to keep up with the ever-changing consumer demands for new and improved products and services. Discover technologies that can help you build an agile, responsive IT infrastructure so you're able to scale to changing needs and make more strategic business decisions.
Posted: 20 Apr 2012 | Premiered: Apr 20, 2012

Red Hat

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Serena Service Management: Free Trial
sponsored by SERENA Software, Inc.
TRIAL SOFTWARE: Serena Service Manager is an processed-based ITSM solution that keeps people and processes perfectly in sync. View now to try Pink Elephant's ITIL innovation of the year.
Posted: 05 Apr 2012 | Premiered: 05 Apr 2012

SERENA Software, Inc.

New Reality of Stealth Crimeware Video
sponsored by Intel
WEBCAST: An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.
Posted: 03 Oct 2012 | Premiered: Oct 3, 2012

Intel

Recognize your Apps Personalities
sponsored by Hewlett Packard Enterprise
VIDEO: This brief video explains how the right applications transformation strategy can lead your enterprise to a new level of success by enabling you to categorize and profile apps based on business impact, simplify apps management, and more.
Posted: 09 Oct 2013 | Premiered: 09 Oct 2013

Hewlett Packard Enterprise

Cloud Computing and Banking: Combatting ATM Fraud
sponsored by Splunk
VIDEO: In this brief video, learn how Orrstown Bank uses cloud computing to keep their services readily available, as well as easily detect patterns of fraud. Tune in to see this cloud computing strategy in action.
Posted: 06 Apr 2016 | Premiered: 06 Apr 2016

Splunk

Smart Strategies To Protect Your Email From Phishing and CEO Fraud
sponsored by Mimecast
WEBCAST: Join cybersecurity and info tech pros Howard Cohen and Orlando Scott-Cowley as they reveal how cybercriminals and employees alike increase the efficacy of phishing attacks, as well as strategies to prevent your email from these attacks.
Posted: 11 Jan 2017 | Premiered: Jan 11, 2017

Mimecast

Top 5 Social Media Scams of 2016
sponsored by Proofpoint, Inc.
VIDEO: This video takes a look at the top 5 social media scams you can encounter today. Discover what methods scammers are using, including bogus surveys, fake subscription sign-ups and imposter social media accounts.
Posted: 12 Sep 2016 | Premiered: 12 May 2016

Proofpoint, Inc.

Inside the 2016 Verizon Data Breach Investigations Report
sponsored by Intel Security
WEBCAST: Join security experts Marc Spitler, Senior Manager at Verizon Security Research, and Raj Samani, CTO for EMEA at Intel Security, as they go over findings from the 2016 Data Breach Investigation Report.
Posted: 26 Sep 2016 | Premiered: Sep 26, 2016

Intel Security

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Protecting Against Impostor Email Threats
sponsored by Proofpoint, Inc.
VIDEO: Learn how to combat imposter emails and other advanced threats by watching this short video. Get detailed email analysis to oust spam, phishing, malware and now imposter emails quickly before they reach your employees.
Posted: 09 Sep 2016 | Premiered: 12 Apr 2016

Proofpoint, Inc.

Webinar: Benefits of Grid Computing in the Cloud
sponsored by RightScale
WEBCAST: See how pharmaceutical, insurance, and Web 2.0 companies are using grid computing to reduce costs and speed processing. You’ll learn how to set up a scalable compute array using RightScale's Grid Edition.
Posted: 25 Feb 2010 | Premiered: Feb 25, 2010

RightScale

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Intel Core vPro Processor Family Animations: More Secure, Manageable, and Responsive
sponsored by Intel
VIRTUAL ENVIRONMENT: In this animation, discover how a hardware-assisted approach to enterprise management can help you remotely secure your PC fleet. Learn how you can reduce deskside visits, boost energy efficiency, remotely protect corporate data from theft and loss, and more – click through now to get started.
Posted: 28 Dec 2012 | Premiered: 28 Dec 2012

Intel

Podcast: Cutting Infrastructure Costs by Stopping Unwanted Mail at the Perimeter: Introduction to Stopping Unwanted Mail
sponsored by Sendmail, Inc.
PODCAST: This new Ask the Expert podcast series focuses on how businesses can significantly cut costs by modernizing their messaging infrastructure and stopping unwanted mail from ever touching it.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013

HID

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO: Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013

SpectorSoft

Improve Your Automated Decisions with Business Rules & Events
sponsored by IBM
VIDEO: Watch this 5-minute video to understand how business rules and business events processing can be used to create intelligent decision automation solutions across a variety of industries and applications. Featured industry scenarios: Healthcare, Retail and Financial Services.
Posted: 10 Oct 2011 | Premiered: 07 Oct 2011

IBM

Adaptive Strong Auth & Federated SSO - The New Power Couple
sponsored by Intel
WEBCAST: Weak identity management policies can strain IT’s ability to scale when it comes to security, privacy, business agility and more. In this webcast, learn about authentication, access control and password policies that you can put into place for stronger data protection.
Posted: 03 Oct 2011 | Premiered: Oct 3, 2011

Intel

RSA Solution for Cloud Security and Compliance
sponsored by RSA
WEBCAST: This webcast talks about how RSA's new solution for Compliance and Cloud Security, and how it will help organizations move to virtualization and cloud computing with a lot of confidence.
Posted: 23 Dec 2010 | Premiered: Dec 23, 2010

RSA

Insurance 2020: Innovating beyond Old Models
sponsored by IBM Line of Business
PODCAST: Podcast discusses the strategic challenges insurance companies will face in the insurance marketplace of the future and shares ideas for moving from today's realities to tomorrow's potential.
Posted: 12 Jun 2008 | Premiered: Jun 12, 2008

IBM Line of Business

Operational Business Intelligence: Accelerate Performance and Lower Your TCO
sponsored by IBM Cognos
WEBCAST: Learn how to make operational BI easy for your organization with real-time delivery of data, fast deployment and pervasive use and adoption by operational users.
Posted: 03 May 2007 | Premiered: May 22, 2007, 14:00 EDT (18:00 GMT)

IBM Cognos

The First Mile - Business Critical Real Time Customer Interactions
sponsored by Kofax, Inc.
WEBCAST: In this age of the empowered customer, companies are pressured to stay on their toes so as to retain customer loyalty in the most intuitive, fast, responsive means possible. In this fascinating webcast, learn the importance of the business-critical First Mile of customer interactions – the point at which customer loyalty is either gained or lost.
Posted: 31 Mar 2014 | Premiered: Mar 31, 2014

Kofax, Inc.

Information Governance - an Enterprise Imperative (Hurwitz & Assoc)
sponsored by IBM
SOFTWARE DEMO: Learn why Hurwitz & Associates deems information governance an imperative for the enterprise in this video featuring Marcia Kaufman.  The video was created for the 2010 Virtual IOD event.
Posted: 17 Mar 2011 | Premiered: 17 Mar 2011

IBM

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement