Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Identity Theft

RSS Feed   
ALSO CALLED: Security Breach, Data Theft, Data Breaches, Data Breach, Data Security Breaches
DEFINITION: Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification  … 

Identity Theft definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Identity Theft Reports
1 - 25 of 130 Matches Previous Page  |  Next Page
7 Considerations for Implementing Zero Trust
sponsored by Banyan Security
RESOURCE: Many organizations are shifting their network defenses from legacy VPNs to a zero trust approach. In this infographic, uncover 7 considerations for implementing zero trust.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Banyan Security

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Okta + Experian: Identity Proofing Your Enterprise
sponsored by Okta
DATA SHEET: In this data sheet, find out how Okta and Experian work together to offer enterprises multiple layers of security and proofing to verify a user’s identity, and ensure they are entitled to access the information they’re trying to access.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

Get Your App Ready for the Global B2B Market
sponsored by Okta
WHITE PAPER: To foster a healthy relationship with enterprise partners and customers, you need to allow those users to use their existing enterprise identities to access your applications or shared resources. In this white paper, learn about 4 ways to integrate your enterprise applications and internal systems with your partners and customers’ identities.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

4 Ways to Improve Customer Experience with a Modern Identity Service
sponsored by Okta
WHITE PAPER: In order to unify the customer experience and drive engagement, there needs to be an identity layer serving as the connective tissue between apps, devices, channels, and experiences. In this white paper, learn how Okta’s modern identity services can help organizations improve their customer experience.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Okta

Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud
sponsored by Buguroo
WHITE PAPER: Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Buguroo

Buyer’s Guide for Complete Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Cybercriminals covet privileges or privileged access because it can expedite access to an organization’s most sensitive targets. In this buyer’s guide, learn how to control, monitor and audit privileges and privileged access to protect against both external and internal threats.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Cisco Umbrella: Reporting You Can Count On
sponsored by Cisco Umbrella
RESOURCE: Deploying a Cisco Umbrella free trial is simple, but it can be hard to figure out where to start. Download this resource to find 3 reports that will help you get started.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cisco Umbrella

Buyer’s Guide for Certificate Lifecycle Automation
sponsored by AppViewX
WHITE PAPER: The number of certificates in your infrastructure is growing with no signs of slowing down. An expiry or certificate-related issue will not only cause an application outage but could also cripple your trust-based systems. In this white paper, uncover a checklist to help you re-evaluate your current certificate management methods.
Posted: 31 Oct 2019 | Published: 31 Oct 2019

AppViewX

Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

Mobile Fraud Detection: Top 4 Threats to the Mobile Channel
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: As the mobile channel increasingly takes center stage, rising security concerns in retail, payments and financial services suggest mobile fraud detection has never been more important. In this white paper, explore 4 trends that are reshaping the threat landscape around the world.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

LexisNexis® Risk Solutions

2019 True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
ANALYST REPORT: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study explores the evolution, expansion and cost of fraud to deliver insights and recommendations on how to effectively sustain your business, successfully manage fraud risks and strengthen customer trust and loyalty. Download the report to explore key findings.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

Retailers are Creating More Opportunity for Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

LexisNexis® Risk Solutions

A Framework for Cybersecurity and Compliance
sponsored by OneNeck IT
WHITE PAPER: In this white paper, discover an outline of how you can methodically assess and structure enterprise security to protect your data and address compliance mandates such as HIPPA, PCI DSS, SOX, as well as NIST SP-800-171 if appropriate, by applying a NIST-based approach to your IT environment.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

OneNeck IT

Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In
sponsored by LexisNexis® Risk Solutions
RESOURCE: The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

Cybercrime Networks: How Businesses Can Join Forces to Beat Fraudsters
sponsored by LexisNexis® Risk Solutions
RESOURCE: Just because businesses are hardening their defenses against cybercrime, doesn’t mean fraudsters are giving up. Instead, they’re getting smarter — and taking a much more collaborative approach. In this resource, learn how businesses can join together to defend against fraud.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

LexisNexis® Risk Solutions

CyberArk Privilege Cloud Whiteboard Video
sponsored by CyberArk Software, Inc
VIDEO: CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.
Posted: 24 Oct 2019 | Premiered: 24 Oct 2019

CyberArk Software, Inc

True Cost of Fraud Webinar
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.
Posted: 23 Oct 2019 | Premiered: Oct 23, 2019

LexisNexis® Risk Solutions

Synthetic Identity - A Rapidly Growing Global Issue
sponsored by RSA
WEBCAST: The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.
Posted: 21 Oct 2019 | Premiered: Oct 21, 2019

RSA

Pogo Paradox: Is Your Infrastructure Your Worst Enemy?
sponsored by PortSys
RESOURCE: In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.
Posted: 14 Oct 2019 | Published: 15 Sep 2019

PortSys

Take a Better TAC to Protect RDP
sponsored by PortSys
RESOURCE: Remote Desktop Protocol (RDP) is one of the most frequently targeted threat vectors today. A comprehensive approach to access control for RDP is needed. In this blog, learn how Total Access Control from PortSys protects RDP in today's modern hybrid enterprise.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys

Making the Business Case for Zero Trust Access
sponsored by PortSys
RESOURCE: Historically, it has been a challenge to translate the technical aspects of a new security architecture into business benefits for the board room and C-suite. In this blog, discover 6 benefits you can highlight when making the business case for Zero Trust Access in the board room and C-suite.
Posted: 27 Sep 2019 | Published: 07 Jun 2019

PortSys

Zero Trust Access What Does it Mean?
sponsored by PortSys
VIDEO: Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.
Posted: 27 Sep 2019 | Premiered: 27 Sep 2019

PortSys

New Tech: Early Adopters Find Smart 'Zero Trust' Access Improves Security Without Stifling Innovation
sponsored by PortSys
RESOURCE: Abused logon credentials continue to fuel the never-ending escalation of cyberattacks. However, the Zero Trust approach could be well on its way to changing this. In this blog, uncover key findings from a recent discussion Byron Acohido of The Last Watchdog, had with PortSys' CEO Michael Oldham about Zero Trust.
Posted: 27 Sep 2019 | Published: 22 Jul 2019

PortSys

Rethinking Third-party Cyber Risk Management
sponsored by CyberGRX
WHITE PAPER: In this white paper, ensure that your current third-party cyber risk management practices will translate into lower third-party cyber risk.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX
1 - 25 of 130 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement