IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Fraud Protection

RSS Feed   
Fraud Protection Reports
1 - 25 of 74 Matches Previous Page  |  Next Page
Protecting a Global Bank From Account Takeover
sponsored by BehavioSec
CASE STUDY: In this case study, a global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts against sophisticated, targeted fraud attempts. Read on to learn how they improved their authentication and fraud capabilities.
Posted: 14 Oct 2021 | Published: 14 Oct 2021

BehavioSec

Fraud management: A perennial business issue
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Increased Exposure: What Financial Institutions Need to Do – Now – to Avoid Fraud Liability stemming from Social Engineering Scams
sponsored by BehavioSec
BLOG: Today’s financial institutions are at risk of facing fraud liability stemming from advanced social engineering attacks where the cybercriminal aims to take over an account by stealing the victim’s credentials. Read this blog post to learn about how to avoid today’s fraud and social engineering attacks.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

BehavioSec

Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EBOOK: PH
Posted: 01 Oct 2021 | Published: 01 Oct 2021


Traditional Threat Management vs. AI-Driven Threat Intelligence
sponsored by Bottomline Technologies, Inc.
EBOOK: PH
Posted: 01 Oct 2021 | Published: 01 Oct 2021


The critical role of email risk scoring in fraud prevention
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: According to Statista, mail usage is predicted to grow by 2-3% each year, with over 92% of emails on corporate networks being personal. But as email usage grows, so too do the cyberthreats targeting user inboxes. Take this short survey to unlock a white paper highlighting the role of email risk scoring in fraud prevention.
Posted: 13 Aug 2021 | Published: 13 Aug 2021

LexisNexis® Risk Solutions

Using LexisNexis Risk Solutions to Enhance Risk Decisions in the 3-D Secure Customer Journey
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In this white paper, learn how the 3DS protocol provides a secure framework to link the acquirer with the issuer to authenticate a cardholder during an e-commerce transaction. Access the paper to get started.
Posted: 13 Aug 2021 | Published: 24 Aug 2021

LexisNexis® Risk Solutions

LexisNexis Risk Solutions 2021 True Cost of Fraud APAC Study
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The cost of fraud continues to rise for retail, e-commerce, and financial institutions in the Asia Pacific (APAC) region. Luckily, this study is here to help companies grow their business safely by navigating the growing risk of fraud. Access the report to learn more.
Posted: 13 Aug 2021 | Published: 23 Aug 2021

LexisNexis® Risk Solutions

LexisNexis Risk Solutions 2021 True Cost of Fraud APAC Study Regional Synopsis
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The cost of fraud continues to rise for retail, e-commerce, and financial institutions in the Asia Pacific (APAC) region. Luckily, this study is here to help companies grow their business safely by navigating the growing risk of fraud. Access the report to learn more.
Posted: 13 Aug 2021 | Published: 23 Aug 2021

LexisNexis® Risk Solutions

The New CyberCrime Landscape
sponsored by LexisNexis® Risk Solutions
RESEARCH CONTENT: Over the past two years, there has understandably been a spike online users and interactions – however, this has also led to a rise in cyberthreats targeting these users and transactions. Access this exclusive report for a comprehensive look at observed global risks, regional trends and industry opportunities in the second half o 2020.
Posted: 13 Aug 2021 | Published: 13 Aug 2021

LexisNexis® Risk Solutions

Breaking the Cycle of Online Fraud
sponsored by F5 Networks
WEBCAST: Enterprise direct fraud losses are climbing – according to Juniper Research, these losses are projected to reach $48B per year by 2023. To make matters worse, current fraud tools require extensive configuration, generate uncertain risk scores and hamper user experience. View this webinar to learn a new AI-driven anti-fraud approach.
Posted: 07 Apr 2021 | Premiered: Apr 7, 2021

F5 Networks

Fraud Insight Report Q2 2020
sponsored by Onfido
ANALYST REPORT: Onfido has unique insight into global document fraud trends. They process millions of identity documents from across the world and are constantly trying to learn from what they are seeing. In this Q2 22020 Fraud Insight Report, dive into some key pieces of insight.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

Onfido

How to Combat Fraud in 3 Easy Steps
sponsored by Onfido
EBOOK: There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Onfido

How to detect the 7 types of document and identity fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

A Computer Weekly buyer’s guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

ComputerWeekly.com

Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by ComputerWeekly.com
EGUIDE: The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 03 Jan 2020 | Published: 03 Jan 2020

ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Are You Using the Best Approach to Catch Digital Identity Fraud?
sponsored by Onfido
RESOURCE: In an all-digital world, ID theft is everywhere. With the data of hundreds of millions of consumers compromised, personally identifiable information can no longer be the cornerstone of online identity verification (IDV) methods. Read on to explore why traditional IDV solutions are failing to defeat identity fraud and how a hybrid IDV can help.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

Network Security: Spotlight on Australia/New Zealand
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 21 Jun 2018 | Published: 21 Jun 2018

ComputerWeekly.com

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Fraud management: A perennial business issue
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

ComputerWeekly.com

Boost Compliance in Accounting with AI
sponsored by ServiceNow
EGUIDE: View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
Posted: 12 Sep 2019 | Published: 06 Sep 2019

ServiceNow

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017


Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by SearchSecurity.com
EBOOK: Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

SearchSecurity.com
1 - 25 of 74 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences