IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Protection

RSS Feed   
Fraud Protection Reports
1 - 25 of 84 Matches Previous Page  |  Next Page
2019 Proofpoint Domain Fraud Report
sponsored by Proofpoint
WHITE PAPER: Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Proofpoint

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

Payroll Fraud: When Direct Deposits Go Rogue
sponsored by Armorblox
WHITE PAPER: One thing all employees can agree on the sense of accomplishment that comes on salary day. Imagine the feeling of disappointment upon realizing that a cybercriminal diverted your wages to their own account. Payroll fraud is a growing problem. In this white paper, take a closer look at what defines payroll fraud and what makes it successful.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations
sponsored by Okta
WEBCAST: For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.
Posted: 27 Mar 2020 | Premiered: Jul 31, 2018

Okta

A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020

Vonage

How to Survive a Bank Robbery
sponsored by Splunk
WHITE PAPER: Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Splunk

Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse
sponsored by SAS
WHITE PAPER: Government fraud is at an all-time high and growing rapidly. In fact, research shows that it accounts for roughly 10% of overall government spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? Download this white paper to discover the benefits of an enterprise approach to fraud.
Posted: 27 Feb 2020 | Published: 27 Feb 2020

SAS

Fraud Detection in Healthcare: a step-by-step guide to incorporating machine learning
sponsored by Dataiku
EGUIDE: There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake
sponsored by Shape Security
CASE STUDY: In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Shape Security

Sophisticated Cyber Attacks and Trends in Online Fraud
sponsored by Shape Security
VIDEO: In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

Procurement Integrity Powered by Continuous Data Monitoring
sponsored by SAS
WHITE PAPER: In this white paper, explore the increasing regulatory pressures putting procurement fraud in a bright light, and review how to combat procurement fraud within your organization with SAS software.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

SAS

The Most Common Types of Invoice Fraud and How to Prevent Them
sponsored by AppZen
WHITE PAPER: How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

AppZen

AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism
sponsored by SAS
WHITE PAPER: Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

SAS

How to Succeed With Fraud Analytics
sponsored by SAS
WHITE PAPER: Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Protect the Integrity of the Procurement Function
sponsored by SAS
WHITE PAPER: Traditional procurement fraud detection methods are not keeping pace. In this white paper, learn about best practices and analytical techniques that are designed to take a different look at what's happening in procurement.
Posted: 27 Mar 2019 | Published: 20 Mar 2019

SAS

Operationalizing Analytics for Intelligent Fraud Detection and Case Management
sponsored by SAS
WHITE PAPER: Account takeover fraud in banking is up nearly 300% year over year, web applications fraud is up 200% and fraud of government services and payments is up 30%. Read on for information on how machine learning and analytics can stop these attacks early.
Posted: 07 Jan 2019 | Published: 31 Dec 2019

SAS

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Boost Compliance in Accounting with AI
sponsored by ServiceNow
EGUIDE: View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
Posted: 12 Sep 2019 | Published: 06 Sep 2019

ServiceNow

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017


Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK: Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchSecurity.com
1 - 25 of 84 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info