ComputerWeekly.com Research Library

Powered by Bitpipe.com

Fraud Protection Research

  • 2019 Proofpoint Domain Fraud Report

    Sponsored by: Proofpoint

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • Payroll Fraud: When Direct Deposits Go Rogue

    Sponsored by: Armorblox

    One thing all employees can agree on the sense of accomplishment that comes on salary day. Imagine the feeling of disappointment upon realizing that a cybercriminal diverted your wages to their own account. Payroll fraud is a growing problem. In this white paper, take a closer look at what defines payroll fraud and what makes it successful.

  • Okta + Experian: Validated Sign-Ups: Identity Proofing to Secure Online Registrations

    Sponsored by: Okta

    For organizations that interact with their consumers on digital mediums, identity and trust are critical factors. Fraudsters can disrupt the user experience, causing long-term harm to a brand’s reputation. This webinar focuses on the emerging best practices in identity proofing – validating users to delineate fraudsters from users.

  • A Guide to Verifying Users for Marketplaces

    Sponsored by: Vonage

    Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.

  • How to Survive a Bank Robbery

    Sponsored by: Splunk

    Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.

  • Reducing Government Budget Deficits by Attacking Fraud, Waste and Abuse

    Sponsored by: SAS

    Government fraud is at an all-time high and growing rapidly. In fact, research shows that it accounts for roughly 10% of overall government spending. But what if governments could minimize deficits by eliminating fraud, waste and abuse? Download this white paper to discover the benefits of an enterprise approach to fraud.

  • Fraud Detection in Healthcare: a step-by-step guide to incorporating machine learning

    Sponsored by: Dataiku

    There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.

  • Top 10 enterprise IT in the Benelux region stories of 2019

    Sponsored by: ComputerWeekly.com

    The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake

    Sponsored by: Shape Security

    In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.

  • Sophisticated Cyber Attacks and Trends in Online Fraud

    Sponsored by: Shape Security

    In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.

  • Live Threat Briefing New Attack Trends in Retail

    Sponsored by: Shape Security

    Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

  • Procurement Integrity Powered by Continuous Data Monitoring

    Sponsored by: SAS

    In this white paper, explore the increasing regulatory pressures putting procurement fraud in a bright light, and review how to combat procurement fraud within your organization with SAS software.

  • The Most Common Types of Invoice Fraud and How to Prevent Them

    Sponsored by: AppZen

    How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.

  • AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism

    Sponsored by: SAS

    Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.

  • How to Succeed With Fraud Analytics

    Sponsored by: SAS

    Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.

  • Protect the Integrity of the Procurement Function

    Sponsored by: SAS

    Traditional procurement fraud detection methods are not keeping pace. In this white paper, learn about best practices and analytical techniques that are designed to take a different look at what's happening in procurement.

  • Operationalizing Analytics for Intelligent Fraud Detection and Case Management

    Sponsored by: SAS

    Account takeover fraud in banking is up nearly 300% year over year, web applications fraud is up 200% and fraud of government services and payments is up 30%. Read on for information on how machine learning and analytics can stop these attacks early.

  • Network Security: Spotlight on Australia/New Zealand

    Sponsored by: ComputerWeekly.com

    In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.

  • Computer Weekly – 30 August 2016: Get protected

    Sponsored by: ComputerWeekly.com

    It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.

  • Boost Compliance in Accounting with AI

    Sponsored by: ServiceNow

    View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.

  • Cyberthreats and Risks in the Payment Card Industry

    Sponsored by: Jumio

    Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.

  • SWIFT Banking System Boosts Security Following Cyberattacks

    Sponsored by: BAE Systems Applied Intelligence

    Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.

  • Who's in Your Wallet? Stemming Credit Card Fraud

    Sponsored by: SearchSecurity.com

    Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.