IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Internet Fraud

RSS Feed    Add to Google    Add to My Yahoo!
Internet Fraud Reports
 
Win the War on Cybercrime with Four Key Elements
sponsored by IBM
WHITE PAPER: The following white paper helps you stay ahead of cybercriminals by outlining the four key elements of fraud prevention.
Posted: 24 Feb 2015 | Published: 31 Dec 2013

IBM

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Portal Authentication: A Balancing Act Between Security, Usability & Compliance
sponsored by PistolStar, Inc.
WHITE PAPER: This white paper discusses the problems with current authentication systems and the drivers that should be motivating organizations of all sizes to improve their access controls.
Posted: 26 Aug 2009 | Published: 25 Aug 2009

PistolStar, Inc.

The 2004 Oversight Systems Financial Executive Report on Sarbanes-Oxley
sponsored by Oversight Systems
WHITE PAPER: Through a combination of an invitation-only online survey and survey intercepts, 222 corporate financial leaders from across the U.S. participated in this study on corporate attitudes toward Sarbanes-Oxley compliance.
Posted: 14 Aug 2008 | Published: 14 Aug 2008

Oversight Systems

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA

Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER: Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009

FireEye

Using Data Mining to Detect Insurance Fraud
sponsored by IBM
WHITE PAPER: Insurers lose millions each year through fraudulent claims. This paper explains how leading insurance companies are using data mining techniques to find fraudulent claims. Read on to learn how to combine powerful analytics with your existing fraud detection and prevention efforts.
Posted: 18 Nov 2010 | Published: 18 Nov 2010

IBM

ebizQ.net Tip Guide: Evolving your dynamic case management strategy
sponsored by IBM
EGUIDE: This Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

IBM

How Master Data Management Serves the Business
sponsored by IBM
WHITE PAPER: This white paper explores the three major approaches that leading organizations use to put master data to work for the business and learn how to leverage a single view of your enterprise to reduce costs, increase agility and support compliance.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement