IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Detection Reports
 
Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by White Hat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 16 Apr 2015 | Published: 18 Dec 2014

White Hat Security

Determining Eligibility using Business Rules
sponsored by Progress
WHITE PAPER: Across industries and departments, organizations make thousands of recurring decisions a day, many of which affect eligibility determination. Failure to manage these decisions effectively and accurately can result in fraud, risk or abuse; delayed benefits to citizens, customers and patients; and revenue loss.
Posted: 26 Jan 2015 | Published: 30 Jun 2014

Progress

The various ways to fight new and emerging cybercrime
sponsored by SearchSecurity.com
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

SearchSecurity.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Decision Management Systems: A practical guide to using business rules and predictive analytics
sponsored by IBM
BOOK: In this book, James Taylor, decisions management systems expert, explores how to use your decision management systems to drive unprecedented levels of business value.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

IBM

SSL: The Backbone of Doing Business over the Internet
sponsored by VeriSign, Inc
WHITE PAPER: Read this white paper to learn about technology in place today that helps online businesses protect sensitive customer data, authenticate themselves, and build consumer trust.
Posted: 17 Feb 2014 | Published: 01 Oct 2008

VeriSign, Inc

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA

A Monthly Online Fraud Report from the RSA Anti-Fraud Command Center Phishing Repository
sponsored by RSA
ANALYST REPORT: Each month the RSA Anti-Fraud Command Center (AFCC) - a 24x7 war room that detects, monitors, tracks and shuts down phishing, pharming and Trojan attacks worldwide - issues an intelligence report that spotlights a new trend in online fraud and also provides the latest statistics and analyses of global phishing trends.
Posted: 20 Feb 2009 | Published: 19 Feb 2009

RSA

Fraud Prevention and Detection for Credit and Debit Card Transactions
sponsored by IBM
WHITE PAPER: Over the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
Posted: 07 Jul 2011 | Published: 01 Aug 2009

IBM

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement