Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Identity Theft

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Breach, Data Theft, Data Breaches, Data Breach, Data Security Breaches
DEFINITION: Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification  … 
Definition continues below.
Identity Theft Reports
1 - 25 of 73 Matches Previous Page  |  Next Page
Increase Trust and Security with Online Customers in a Convenient, Cost-Effective Manner
sponsored by CA Technologies
WHITE PAPER: This guide highlights a secure, user-convenient and cost-effective way to protect consumer portals and mobile applications. Discover ways to silently and transparently collect data and assess risk based on factors like device ID and user behavior.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

CA Technologies

How Can I Defend my Hybrid Enterprise From Data Breaches and Insider Threats?
sponsored by CA Technologies.
WHITE PAPER: This white paper teaches you how to effectively manage privileged access across on-premises, cloud, and hybrid environments. Read on to find out why perimeter defenses are failing and why IAM needs to be at the forefront of your security strategy.
Posted: 03 Feb 2016 | Published: 30 Dec 2015

CA Technologies.

Layered Security Strategies for a Mobile-First World
sponsored by Microsoft
WHITE PAPER: This security value paper reveals strategies to keep users productive and connected, without compromising corporate security posture. Discover why an integrated approach is an effective one.
Posted: 03 Feb 2016 | Published: 27 Nov 2015

Microsoft

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM

Case Study: National Healthcare Provider Secures Office 365
sponsored by Palerra Inc.
CASE STUDY: In this white paper, review how one of the largest national healthcare providers in the U.S. filled in Office 365 and cloud security gaps and adhere to regulatory requirements.
Posted: 14 Jan 2016 | Published: 02 Dec 2015

Palerra Inc.

The Challenge of Keeping IAM Simple
sponsored by Thycotic
EGUIDE: This expert e-guide presents the individual challenges the 4 key IAM roles face as they work to mitigate identity fraud/theft. Continue reading to learn why previous IAM projects have failed and how you can overcome the many challenges your organization faces to simplify your IAM approach.
Posted: 14 Jan 2016 | Published: 14 Jan 2015

Thycotic

Privileged Account Management Security Action Plan
sponsored by Thycotic
WHITE PAPER: This white paper explains why your organization cannot continue operating without privileged account management as the risks for a crippling data breach skyrocket each day without it. View now to learn the challenges of privileged account management and what you can do to overcome them to improve security.
Posted: 08 Jan 2016 | Published: 05 Nov 2015

Thycotic

Best Practices for UNIX/LINUX Priviledged Identity and Access Management
sponsored by FoxT
WHITE PAPER: On Unix/Linux OSs, the all-powerful "root" privilege is the key to your organization facing a serious breach. This white paper explores the importance of limiting access privileges and the vulnerabilities root privileges create. Read on and learn Unix/Linux OS best practices
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

OPM Breach: Why Security Needs to be a Priority
sponsored by FoxT
WHITE PAPER: Learn more about the political battle security teams are losing and why root access requirements leave your organization open to an IAM hack in this white paper. Find out how to granularly manage access accounts and control privileges across diverse operating systems.
Posted: 04 Jan 2016 | Published: 23 Dec 2015

FoxT

Hacker Survey Report: The Flaws in IAM
sponsored by Thycotic
WHITE PAPER: In this white paper, examine the shocking truths about identity and access management (IAM) flaws and the war against hackers. Learn 4 steps to stronger privileged account management.
Posted: 04 Jan 2016 | Published: 30 Dec 2015

Thycotic

Securely Connecting Users to Cloud Apps with Integrated Cloud Access and Control
sponsored by IBM
WHITE PAPER: This research brief discusses how to employ identity as a service (IDaaS) for single sign-on (SSO) as a means to control both on-premises and mobile user cloud app usage. Access now and learn how to apply a "detect, connect, and protect" methodology to the visibility and control requirements of a cloud access security broker (CASB) offering.
Posted: 22 Dec 2015 | Published: 30 Oct 2015

IBM

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

Your Guide to Zen and the Art of Delivering Identity Federation
sponsored by Radiant Logic, Inc.
EBOOK: In this e-book, you will discover how to deliver first-class identity security and federation with stronger authentication and richer authorization. Read on to and find out why federating the identity layer is essential for empowering today's fragmented IAM infrastructures.
Posted: 14 Dec 2015 | Published: 31 Dec 2014

Radiant Logic, Inc.

How to Ensure Strong Passwords and Better Authentication in Enterprises
sponsored by Dashlane Inc.
EGUIDE: This expert e-guide explores two-factor authentication alternatives to increase identity and access management (IAM) in the enterprise as well as how to bolster remote access authorization security. Inside, learn best practices for users, IT, and the helpdesk.
Posted: 04 Dec 2015 | Published: 25 Nov 2015

Dashlane Inc.

Choosing an IAM Architecture for Improved Business Processes
sponsored by Dashlane Inc.
EGUIDE: This white paper presents the features and capabilities an IAM architecture needs to have to improve business processes and simplify onboarding. Read on to learn how to determine if a provider-centric or user-centric model is the best for your organization.
Posted: 03 Dec 2015 | Published: 30 Nov 2015

Dashlane Inc.

Better IAM Means a Better Experience
sponsored by Dashlane Inc.
WHITE PAPER: Could SSO be the key to blocking credential and identity theft? In this white paper, learn about next-gen IAM approaches to mitigate credential theft.
Posted: 25 Nov 2015 | Published: 18 Nov 2015

Dashlane Inc.

Information Security Asean November 2015
sponsored by TechTarget ANZ
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Outsmarting Hackers: Why You Need Both Strong and Risk-Based Authentication
sponsored by CA Technologies.
WHITE PAPER: This white paper presents a layered IAM security approach incorporating both strong authentication and risk-based authentication.
Posted: 12 Jun 2015 | Published: 11 Dec 2014

CA Technologies.

What is an Identity Provider and Why Do I Need to Become One
sponsored by SecureAuth
WHITE PAPER: This white paper addresses the reasons enterprises should become Identity Providers (IdPs), what becoming an IdP involves, and why you should consider automating this process as much as possible.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Information Security ANZ March 2015
sponsored by SearchSecurity.com
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

Information Security ANZ November
sponsored by SearchSecurity.com
EZINE: In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

SearchSecurity.com

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation
1 - 25 of 73 Matches Previous Page    1 2 3    Next Page
 
IDENTITY THEFT DEFINITION (continued): …  to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen. Identity theft is categorized in two ways: true name and account takeover. True name identity theft means that the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Account takeover identity theft means the imposter uses personal information to gain access to the person's existing accounts. Typically, the thief will change the … 
Identity Theft definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement