Online Fraud Reports

10 common uses for machine learning applications in business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

Threat and Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper explores these features, and the challenges that organizations face related to making sense of information in order to revolutionize their ability to mitigate threat and fraud.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

IBM

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
sponsored by IBM
WHITE PAPER: This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

How to prevent phishing attacks: User awareness and training
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

TechTarget Security

Securities and capital markets
sponsored by IBM
WHITE PAPER: IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Boost Compliance in Accounting with AI
sponsored by ServiceNow
EGUIDE: View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
Posted: 12 Sep 2019 | Published: 06 Sep 2019

ServiceNow

The various ways to fight new and emerging cybercrime
sponsored by TechTarget Security
EGUIDE: Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

TechTarget Security