IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Fraud DetectionReports
 
Managing Access Security in a Multi-Perimeter World
sponsored by IBM
WEBCAST: Uncover how an identity and access management strategy can help your organization overcome the risks associated with cloud computing, enterprise mobility, and collaboration in a multi-perimeter enterprise.
Posted: 07 Mar 2013 | Premiered: Dec 31, 2012

IBM

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

How to prevent phishing attacks: User awareness and training
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

SearchSecurity.com

Smarter Security Intelligence: Leverage Big Data Analytics to Improve Enterprise Security
sponsored by IBM
WHITE PAPER: This white paper highlights how big data analytics can be utilized to react to security incidents, as well as predict, prevent and take real-time action.
Posted: 27 Mar 2014 | Published: 31 Oct 2013

IBM

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.

Avoid Overlooking the Growing Fraud Threat When Planning AP Automation
sponsored by SAP America, Inc.
WHITE PAPER: This paper discusses how automated AP can help reduce a great portion of frauds and schemes with less human "touch points" involved in invoice processing which translates to less chances for dishonest employees to falsify invoice data or otherwise manipulate the AP process for personal gain.
Posted: 11 Dec 2009 | Published: 11 Dec 2009

SAP America, Inc.

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

The RSA Authentication Decision Tree: Selecting the Best Authentication Solution for Your Business
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper provides an overview of the Authentication Decision Tree; examines the five factors critical to selecting an authentication solution; and offers a clear guide to selecting the right solution that effectively balances risk, cost and end user convenience.
Posted: 12 Nov 2009 | Published: 18 Mar 2009

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement