IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Management

RSS Feed   
Fraud Management Reports
 
The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

CNP Fraud in Jewelry & Watch Sales
sponsored by Riskified
WHITE PAPER: Online watch and jewelry retailers often struggle to find a balance between CNP fraud prevention and providing a smooth shopping experience. Download this report to learn about online fraud prevention in this industry, and how to improve security without negatively affecting customer experience.
Posted: 10 Aug 2018 | Published: 10 Aug 2018

Riskified

Enterprise Risk Mitigation for Community Banks
sponsored by SAS
WHITE PAPER: Keeping pace with anti-fraud and anti-money laundering (AML) regulations represents a significant burden for financial institutions, particularly smaller ones. Download this white paper to learn more about the challenges these regulations pose and how to meet them.
Posted: 01 Nov 2018 | Published: 01 Nov 2018

SAS

The various ways to fight new and emerging cybercrime
sponsored by SearchSecurity.com
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

SearchSecurity.com

The Impact of Business Analytics on Performance and Profitability
sponsored by SAS
WHITE PAPER: Let it be stated plainly: Business analytics are the key to achieving these challenging objectives. Our world generated more data in 2009 than in the previous recorded history of mankind. A good deal of this data can be converted into useful information and competitive advantage – by applying the right analytics.
Posted: 30 Jul 2010 | Published: 30 Jul 2010

SAS

Control Access and Protect Assets with Print-on-Demand Intelligent ID Cards
sponsored by Zebra Technologies
WHITE PAPER: Fraud and theft are constant threats to any organization. This paper defines how human resources and security departments can print intelligent ID cards to identify employees, visitors and patrons, and manage access to facilities, equipment, and services through a range of “intelligent” access card technologies.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

Zebra Technologies

Splunk for Fraud Detection
sponsored by Splunk
RESOURCE: Don't let potential red flags fall through the cracks. Find out how your business can get advanced threat detection and protection today.
Posted: 27 Jul 2018 | Published: 27 Jul 2018

Splunk

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: Fraud is a growing problem in the U.S. and is expected to grow 10% more each year, according to Splunk. This white paper presents various real life scenarios of fraud challenges being faced by Duke University and others.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Splunk

A Guide to Fraud in the Real World
sponsored by Splunk
WHITE PAPER: In the digital era, fraud is becoming harder to prevent. Organizations are turning to machine data, which they can analyze to learn vital fraud prevention information. Download this report to learn how Duke University and several other organizations handled a fraudulent attack with machine data analysis.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement