IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Fraud Multimedia (View All Report Types)
 
eCommerce Payments 101
sponsored by CyberSource
VIDEO: You're more than an online provider of goods and services -- you're a trusted vault of sensitive customer data. Discover ways to streamline and automate payment operations while simplifying fraud management and payment security.
Posted: 20 Jun 2016 | Premiered: 16 Jan 2015

CyberSource

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM

Endpoint security controls
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Learn about enterprise endpoint security controls to ensure your organization has successful threat protection.
Posted: 16 May 2016 | Premiered: 02 May 2016

SearchSecurity.com

Builders vs. Breakers: 10 Preventable Online Attacks
sponsored by Pluralsight
VIDEO: Discover 10 examples of recent online attacks that could have been easily prevented, including problems with SQL injection, XSS, password hashing, and more. Learn how you can protect your data with two factor authentication.
Posted: 20 May 2016 | Premiered: 05 May 2014

Pluralsight

Elevate's CISO Explains Why He Chose Masergy Managed Security
sponsored by MASERGY
VIDEO: One CISO was unhappy with the level of service that one managed security provider was showing. Watch this 2 minute video to learn how this CISO compared two competing managed security providers, why he recommends doing side-by-side comparisons and why he chose to go with the provider he did.
Posted: 31 May 2016 | Premiered: 25 May 2016

MASERGY

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement