Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Security Breaches

RSS Feed   
Data Security Breaches Reports
 
Ensure That Biometric Authentication Technologies Are Secure
sponsored by Onfido
EGUIDE: Biometrics are often perceived as being more secure than traditional passwords. However, this is not always the case. In this e-guide, learn how researchers at the University of North Carolina at Chapel Hill achieved authentication using a virtual reality model of an authorized user's face.
Posted: 04 Mar 2019 | Published: 28 Feb 2019

Onfido

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Independent Study Pinpoints Significant SCADA/ICS Security Risks
sponsored by Fortinet, Inc.
ANALYST REPORT: Many organizations beyond electric and water utilities have deployed SCADA/ICS as they look to automate their data collection and their equipment. However, the technologies have become high-value targets for hackers. In this research report, explore common SCADA and ICS threats and find recommendations for mitigating the risks they pose.
Posted: 09 Aug 2019 | Published: 16 Apr 2019

Fortinet, Inc.

Can Cryptography Save Our Elections
sponsored by RSA Conference
RESOURCE: Microsoft's recent unveiling of open source ElectionGuard is the latest response to an increasingly urgent question: How secure are our elections? And if it can lock down votes, then what else is cryptography capable of? Download this podcast transcript to learn more about cryptography's expanding role in cybersecurity.
Posted: 26 Jul 2019 | Published: 23 May 2019

RSA Conference

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

Synthetic Identity - A Rapidly Growing Global Issue
sponsored by RSA
WEBCAST: The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

RSA

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Mobile Fraud Detection: Top 4 Threats to the Mobile Channel
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

How Leading Online Bank Combats Identity Fraud
sponsored by Onfido
CASE STUDY: A user's name, date of birth, and address are all data points that can be easily stolen to create fake bank accounts. But, fraudsters committing these crimes can't get past all security tools. Download this case study to find out how Revolut used Onfido to successfully verify users and keep their customer accounts secure.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Onfido

7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement