IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Management

RSS Feed    Add to Google    Add to My Yahoo!
Online Fraud Management Reports
 
Transforming Government Fraud Detection and Prevention
sponsored by Information Builders
WHITE PAPER: View this white paper to learn more about the challenges you could face related to fraud and abuse that has the potential to lead to billions of dollars lost for your business. Oftentimes, government institutions lack the resources to prevent fraud, waste and abuse (FWA.) Find a solution to this obstacle by reading this resource now.
Posted: 01 May 2013 | Published: 01 May 2013

Information Builders

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

The Massachusetts Data Protection Law
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

SearchSecurity.com & SearchCompliance.com

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Client Case Study: MoneyGram International
sponsored by IBM
WHITE PAPER: This case study outlines the solution MoneyGram choose to help integrate their information in real-time and provide actionable insight so company managers can quickly identify questionable patterns and proactively enact new processing rules to reduce fraud.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Going Beyond Traditional Security Information and Event Management (SIEM) Solutions
sponsored by eIQnetworks
PODCAST: Why is Security Information and Event Management (SIEM) so important to security efforts? What steps must you take must to succeed with your SIEM implementation? This podcast addresses these questions and more.
Posted: 10 Mar 2009 | Premiered: Mar 10, 2009

eIQnetworks

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Alternative Managed Accounts White Paper
sponsored by Advent Software, Inc
WHITE PAPER: Read this paper to learn the six essential pillars of a successful managed account platform and the technology required to support it.
Posted: 08 Nov 2010 | Published: 08 Nov 2010

Advent Software, Inc

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

VeriSign® Identity Protection Fraud Detection Service
sponsored by VeriSign EMEA
WHITE PAPER: This white paper explores how the VeriSign® Identity Protection (VIP) Fraud Detection Service helps organizations mitigate issues related to identity theft and insider threats.
Posted: 04 Dec 2008 | Published: 13 Nov 2008

VeriSign EMEA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement