Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Data Theft

RSS Feed   
Data Theft Reports
 
The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

'Friendly Friction' the Guide to Optimizing Onboarding
sponsored by Onfido
EBOOK: Tools that make your life more convenient also tend to make it less secure. That being said –when it comes to user onboarding, there's still a tension between onboarding users quickly and keeping compliant. In this white paper, learn 5 ways to make friction friendlier and achieve secure onboarding.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

The Future of Digital Onboarding
sponsored by Onfido
VIDEO: Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.
Posted: 03 Apr 2019 | Premiered: 03 Apr 2019

Onfido

Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Balancing Fraud Detection and the Customer Experience
sponsored by SAS
WHITE PAPER: Digital channels are a must-have in the financial industry as customers flock to the businesses that can offer speed and convenience. But there's a dark side. The relative anonymity of digital channels opens up new doors for fraud. In this white paper, learn how organizations can verify a true identity and identify high-risk behavior in real time.
Posted: 07 Aug 2019 | Published: 31 Mar 2019

SAS

Detect and Prevent Identity Theft
sponsored by SAS
WHITE PAPER: In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

SAS

Winning the Battle Over Passwords
sponsored by OneLogin
WHITE PAPER: Companies worldwide are in a war against cybercriminals. It's ongoing with no end in sight, and every company is at risk. Access credentials, particularly passwords, are at the heart of the battle because hackers are trying to obtain them. In this white paper, explore the dangers of poor passwords and learn how companies can secure them now.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

OneLogin
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement