Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Security Breach

RSS Feed   
Security Breach White Papers (View All Report Types)
 
How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
WHITE PAPER: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Onfido

General Data Protection Regulation (GDPR): Balancing Risk and Corporate Reputation
sponsored by HID Global
WHITE PAPER: As the amount of breaches rise and the consequences for breaches get more expensive, it's imperative to keep anyone with malicious intent out of your company's networks and systems. In this white paper, learn how identity and access management technologies can keep your data secure and help your organization comply with the GDPR.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

HID Global

Financial Services, Fraud and the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Onfido

Supporting Business Agility in a Connected World
sponsored by HID Global
WHITE PAPER: In the digital revolution, information is the key to success, but organizations need to properly secure it – and customers are willing to trust financial institutions that will stay secure. In this white paper, learn how banks can secure their most valuable assets while adapting to a changing landscape.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

HID Global

Advanced Authentication Technologies for Detecting Real-time Threats to Banks
sponsored by HID Global
WHITE PAPER: Any financial institution or business that offers online financial services is a top target for hackers. If customers connecting to banking applications are doing so via infected devices, the malware resident can collect sensitive information. In this white paper, learn how ActivID Threat Detection Services can help protect your sensitive data.
Posted: 12 Apr 2019 | Published: 25 May 2016

HID Global

Financial Services, Fraud and the Future of Digital Onboarding
sponsored by Onfido
WHITE PAPER: Today, identifiers and regulations such as Know Your Customer (KYC) are raising new challenges for smooth and secure onboarding. In this white paper, learn about identity verification best practices, such as biometrics, that can help your organization keep up with the changing landscape of identity theft and fraud.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

Onfido

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

Identity and Data Management: The Strategic Imperative
sponsored by Optiv
WHITE PAPER: In the era of digital transformation, identity and data management (IDM) is essential to strategic security programs to protect and control continuously shifting assets needed in business enablement initiatives. In this white paper, explore key elements that Optiv recommends organizations include in their strategic IDM program.
Posted: 26 Mar 2019 | Published: 26 Mar 2019

Optiv

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement