Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Breach

RSS Feed   
Data Breach Reports
 
5 Ways Fraudsters Fake Your ID
sponsored by Onfido
VIDEO: In this webinar, PYMNTS CEO Karen Webster and Kevin Trilli, Chief Product Officer at Onfido, discuss the current trends in fraud techniques, and reveal how risk and fraud managers can utilize new technologies to catch them. Watch now to learn the most common identity document fraud techniques and how to spot them.
Posted: 01 Apr 2019 | Premiered: 25 Feb 2019

Onfido

The Sharing Economy - The 7 Challenges of Online Identity Verification
sponsored by Evident
WHITE PAPER: The absence of a standardized, fully reliable method of verifying the identity of participants and equipping them to prove the authenticity of their credentials could pose a real challenge to the success of sharing economy participants. In this white paper, examine 7 major hurdles to effective and consistent online identity verification.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Evident

How Leading Online Bank Combats Identity Fraud
sponsored by Onfido
CASE STUDY: A user's name, date of birth, and address are all data points that can be easily stolen to create fake bank accounts. But, fraudsters committing these crimes can't get past all security tools. Download this case study to find out how Revolut used Onfido to successfully verify users and keep their customer accounts secure.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Onfido

HID ActivOne User Friendly Strong Authentication
sponsored by HID Global
WHITE PAPER: As the number of ways to access your organization and its sensitive data increase, so does the potential for breaches. Securing credentials through strong authentication is key to preventing identity-related data breaches. In this white paper, learn how HID Global protects identities by taking a holistic approach to identity and access management.
Posted: 11 Apr 2019 | Published: 02 Nov 2018

HID Global

Couchsurfing Verifies the Identity of Users and Builds Trust Throughout Community
sponsored by Onfido
CASE STUDY: Since an address, credit card, or phone number doesn't verify a user's identity directly, Couchsurfing a social networking site for travelers, wanted a verification system that would improve trust between its users. Read on to find out how Onfido made this happen.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Onfido

Top 5 Critical Alerts You Need for IT Security
sponsored by ManageEngine
WHITE PAPER: Analyzing log data and identifying which security events are of concern among thousands of routine events can be a challenge, especially if you aren't sure which events to track. In this white paper, explore a list of 5 critical events your organization should be on the lookout for.
Posted: 13 May 2019 | Published: 13 May 2019

ManageEngine

E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime
sponsored by ArcSight, an HP Company
EGUIDE: When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

What to Look for in Web Application Firewall Products
sponsored by SearchSecurity.com
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

SearchSecurity.com

SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement