IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Detection

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud DetectionReports
 
Electronics Retailer Reduces Order Fraud by 25% with iovation
sponsored by iovation, Inc.
WHITE PAPER: A major computer and electronics retailer fights back against identity theft and credit card fraud, by adding device intelligence into their fraud prevention strategy. Find out how it works behind the scenes.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Fighting fraud in government
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Public sector organisations are experiencing increasing levels of economic crime, including cybercrime, and are particularly at risk from being defrauded by their own employees and their suppliers, according to findings from PwC’s latest Global Economic Crime Survey.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

ComputerWeekly.com

How to prevent phishing attacks: User awareness and training
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

SearchSecurity.com

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
sponsored by IBM
WHITE PAPER: This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

Client Case Study: MoneyGram International
sponsored by IBM
WHITE PAPER: This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement