IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Online Fraud Management

RSS Feed   
Online Fraud Management Reports
 
A Computer Weekly buyer's guide to blockchain technology
sponsored by ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

ComputerWeekly.com

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assessĀ  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake
sponsored by Shape Security
CASE STUDY: In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Shape Security

A Modern Model for Preventing Bank Fraud
sponsored by Hitachi Vantara
EBOOK: TABB Group research has found that financial firms are shifting from a historical reliance on a collection of independent point solutions towards implementing a data analytics pipeline platform to streamline fraud prevention. To read about the 5 key ingredients used to protect against bank fraud, read this e-book.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Hitachi Vantara

Are you Using the Best Approach to Catch Digital Identity Fraud?
sponsored by Onfido
RESOURCE: In an all-digital world, ID theft is everywhere. With the data of hundreds of millions of consumers compromised, personally identifiable information can no longer be the cornerstone of online identity verification (IDV) methods. Read on to explore why traditional IDV solutions are failing to defeat identity fraud and how a hybrid IDV can help.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

Fighting Economic Crime in the Financial Services sector
sponsored by ComputerWeekly.com
IT BRIEFING: PwC examines the impact of Cybercrime on the financial services industry.
Posted: 27 Mar 2012 | Published: 26 Mar 2012

ComputerWeekly.com

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

ebizQ.net Tip Guide: Evolving your dynamic case management strategy
sponsored by IBM
EGUIDE: This Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
Posted: 16 Sep 2011 | Published: 16 Sep 2011

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement