Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Security Breach

RSS Feed    Add to Google    Add to My Yahoo!
Security Breach Reports
 
Internet Trust Marks: Building Confidence and Profit Online
sponsored by Symantec Website Security Solutions
WHITE PAPER: This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Posted: 14 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Information Security ANZ November
sponsored by SearchSecurity.com
EZINE: In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

SearchSecurity.com

Information Security Asean November 2015
sponsored by TechTarget ANZ
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015


Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Making the FACTA Red Flags Rules Operational
sponsored by RSA
WHITE PAPER: Read this paper to learn how technology can be leveraged to automate identity theft detection, prevention, and mitigation as part of your FACTA Red Flags compliance program.
Posted: 17 Oct 2008 | Published: 16 Oct 2008

RSA

How Extended Validation SSL Brings Confidence to Online Sales and Transactions
sponsored by Symantec Website Security Solutions
WHITE PAPER: This white paper discusses the importance of increasing customer confidence in the security of online business transactions, and introduces Symantec Extended Validation SSL Certificates as a potential solution to this challenge.
Posted: 15 Jan 2015 | Published: 31 Oct 2013

Symantec Website Security Solutions

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

Defining Identity Management
sponsored by Hitachi ID Systems, Inc.
WHITE PAPER: This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Hitachi ID Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement