The New Business Imperative
sponsored by F5 Networks
EBOOK:
In thie eguide, read about a new business imperative, involving the shift to adopting cross functional, cost-out, and revenue-in capabilities.
Posted: 08 Feb 2021 | Published: 08 Feb 2021
|
|
|
A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE:
Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019
|
|
|
The Industrialization of Fraud: Fighting Fire With Fire
sponsored by F5 Networks
EBOOK:
Placeholder
Posted: 08 Feb 2021 | Published: 08 Feb 2021
|
|
|
Eighth Annual Fraud Report
sponsored by IDology
RESEARCH CONTENT:
Like changes in the market, cyberthreats evolve and change each year – especially with threats like fraud. This research report from IDology highlights how fraud evolved in 2020 and provides key insight into how events like COVID impacted fraud. Read on to unlock the full report.
Posted: 16 Feb 2021 | Published: 16 Feb 2021
|
|
|
As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER:
Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012
|
|
|
IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST:
View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013
|
|
|
Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE:
This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010
|
|
|
Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER:
Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011
|
|
|
E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK:
SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010
|
|
|
Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER:
This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013
|
|
|
|
|