Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Computer Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Computer Fraud Reports
 
CW Middle East July to Sept 2017
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Middle East, we find out why the Gulf region must do more to attract women into IT if the region’s countries are to diversify.
Posted: 06 Jul 2017 | Published: 13 Jul 2017

ComputerWeekly.com

CW Benelux August 2017
sponsored by ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 02 Aug 2017 | Published: 10 Aug 2017

ComputerWeekly.com

CW ANZ November 2016
sponsored by SearchSecurity.com
EZINE: With the number of cyber incidents identified by Australian organisations more than doubling in the past year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

SearchSecurity.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Combating Insider Threats - The Application-level User Behavior Tracking Approach
sponsored by Intellinx Software Inc.
WHITE PAPER: This white paper looks at the growing problem of the insider threat and discusses the regulatory and other drivers that fuel the demand for new security solutions in this area. Find out how to mitigate insider threats and read this paper today.
Posted: 17 May 2007 | Published: 01 Apr 2006

Intellinx Software Inc.

2008 Verizon Business Data Breach Investigations Report
sponsored by Verizon Business
WEBCAST: Check out this webcast to learn about the critical trends in data theft and learn about strategies for increasing your company's data security against internal and external attacks.
Posted: 10 Jun 2008 | Premiered: Jun 19, 2008, 10:00 EDT (14:00 GMT)

Verizon Business

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository
sponsored by RSA
ANALYST REPORT: Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
Posted: 20 Feb 2009 | Published: 19 Feb 2009

RSA

Cascading Risk
sponsored by Core Security Technologies
WEBCAST: This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
Posted: 04 Apr 2007 | Premiered: Apr 26, 2007, 14:00 EDT (18:00 GMT)

Core Security Technologies

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement