IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Protection

RSS Feed   
Fraud Protection Reports
1 - 25 of 102 Matches Previous Page  |  Next Page
Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Retailers are Creating More Opportunity for Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

True Cost of Fraud Webinar
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.
Posted: 23 Oct 2019 | Premiered: Oct 23, 2019

LexisNexis® Risk Solutions

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Taking the Driver's Seat
sponsored by Concur Technologies
WHITE PAPER: Download this white paper for tips and tricks on how to better manage, detect, and prevent enterprise fraud today.
Posted: 02 Oct 2019 | Published: 02 Oct 2019

Concur Technologies

Detecting and Preventing Cybercrime and Fraud
sponsored by Concur Technologies
WHITE PAPER: In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.
Posted: 18 Sep 2019 | Published: 18 Sep 2019

Concur Technologies

The New Age of Fraud
sponsored by Concur Technologies
WHITE PAPER: Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.
Posted: 18 Sep 2019 | Published: 31 Aug 2019

Concur Technologies

Boost Compliance in Accounting with AI
sponsored by ServiceNow
EGUIDE: View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
Posted: 12 Sep 2019 | Published: 06 Sep 2019

ServiceNow

Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake
sponsored by Shape Security
CASE STUDY: In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Shape Security

Sophisticated Cyber Attacks and Trends in Online Fraud
sponsored by Shape Security
VIDEO: In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.
Posted: 26 Aug 2019 | Premiered: 26 Aug 2019

Shape Security

Live Threat Briefing New Attack Trends in Retail
sponsored by Shape Security
WEBCAST: Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.
Posted: 19 Aug 2019 | Premiered: Aug 19, 2019

Shape Security

Procurement Integrity Powered by Continuous Data Monitoring
sponsored by SAS
WHITE PAPER: In this white paper, explore the increasing regulatory pressures putting procurement fraud in a bright light, and review how to combat procurement fraud within your organization with SAS software.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

SAS

The Most Common Types of Invoice Fraud and How to Prevent Them
sponsored by AppZen
WHITE PAPER: How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

AppZen

AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism
sponsored by SAS
WHITE PAPER: Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

SAS

Keeping Fraud Detection Software Aligned With the Latest Threats
sponsored by SAS
WHITE PAPER: Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

How to Succeed With Fraud Analytics
sponsored by SAS
WHITE PAPER: Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.
Posted: 07 Aug 2019 | Published: 07 Aug 2019

SAS

Fraud Investigation Management
sponsored by TIBCO
WEBCAST: Download this webcast to learn about a 5 layer approach to fraud management, so your organization can become more proactive and not just reactive.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019

TIBCO

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Understanding Email Fraud
sponsored by Proofpoint
ANALYST REPORT: Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Proofpoint

2019 Threat Report: Email Fraud in Financial Services
sponsored by Proofpoint
RESEARCH CONTENT: Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Proofpoint

One Fish, Two Fish, Three Fish, Fraud Fish
sponsored by Splunk
RESOURCE: In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.
Posted: 10 May 2019 | Published: 21 Oct 2019

Splunk

Can Your ID Verification Solution Stand the Heat?
sponsored by Onfido
RESOURCE: Learn how you can exceed your customers' expectations with faster, more accurate ID verification that eliminates even the most sophisticated fraud attempts.
Posted: 23 Apr 2019 | Published: 23 Apr 2019

Onfido

Are you Using the Best Approach to Catch Digital Identity Fraud?
sponsored by Onfido
RESOURCE: In an all-digital world, ID theft is everywhere. With the data of hundreds of millions of consumers compromised, personally identifiable information can no longer be the cornerstone of online identity verification (IDV) methods. Read on to explore why traditional IDV solutions are failing to defeat identity fraud and how a hybrid IDV can help.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

AXCESS Financial Finds & Stops Fraud with Interaction Analytics
sponsored by CallMiner
CASE STUDY: AXCESS Financial needed a way to solve their fraud problem. In order to do this they deployed CallMiner Eureka Interaction Analytics which helped them to identify fraudsters. In this case study, learn more about how AXCESS Financial turned insight into prevention using CallMiner Eureka.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

CallMiner
1 - 25 of 102 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement