ComputerWeekly.com Research Library

Powered by Bitpipe.com

Fraud Protection Research

  • Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud

    Sponsored by: Buguroo

    Behavioral biometrics provides a new generation of security solutions for the user, by identifying people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn more.

  • Top 10 Anti-Fraud Tips: The Cybersecurity Breach Aftermath

    Sponsored by: LexisNexis® Risk Solutions

    In the wake of numerous large-scale data breaches, stolen data such as login credentials and payment details are being widely leveraged by cybercriminals for fraudulent activity. In this white paper, learn how to accurately authenticate your users in real time, and secure against fraud and account takeover attacks.

  • Retailers are Creating More Opportunity for Fraudsters

    Sponsored by: LexisNexis® Risk Solutions

    Fraudster are exploiting digital channels and seizing more opportunities across a diverse set of retailers. Learn more about fraud attempts, targets, driving factors, top challenges and recommendations in this infographic.

  • Fighting Retail Fraud: Shut Bad Actors Out and Keep Good Customers Rolling In

    Sponsored by: LexisNexis® Risk Solutions

    The use of the mobile channel for purchasing digital and/or physical goods has grown significantly over the past year. This retail evolution to the mobile channel widens the landscape for fraudsters and brings new challenges specific to the mobile channel. In this infographic, learn about the top 3 mobile channel challenges and how to fight back.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • A Computer Weekly buyer's guide to blockchain technology

    Sponsored by: ComputerWeekly.com

    Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.

  • Taking the Driver's Seat

    Sponsored by: Concur Technologies

    Download this white paper for tips and tricks on how to better manage, detect, and prevent enterprise fraud today.

  • Detecting and Preventing Cybercrime and Fraud

    Sponsored by: Concur Technologies

    In this white paper, explore what CFOs from some of Australia's leading businesses have to say about their cybercrime and fraud experiences and the risks facing their businesses today. Also, explore advice for businesses looking to tackle fraud.

  • The New Age of Fraud

    Sponsored by: Concur Technologies

    Today, there is a realization that fraud is an enterprise risk that falls in the same realm as supply chain, disaster and regulatory risks. But how can companies prevent, detect and mitigate this risk? In this white paper, examine how companies are putting a microscope on employee spend to better prevent and detect fraud across their business.

  • Boost Compliance in Accounting with AI

    Sponsored by: ServiceNow

    View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.

  • Retailer Solves Shoe-Bot Spikes, Fixes Fraud, Friction and Fake

    Sponsored by: Shape Security

    In this case study, find out how a North American retailer fought fraud and overcame a variety of cybersecurity challenges to provide a friction-free shopping experience.

  • Sophisticated Cyber Attacks and Trends in Online Fraud

    Sponsored by: Shape Security

    In this video, listen to Dan Woods, former FBI agent, discuss sophisticated cyberattacks and trends in online fraud.

  • Live Threat Briefing New Attack Trends in Retail

    Sponsored by: Shape Security

    Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

  • Procurement Integrity Powered by Continuous Data Monitoring

    Sponsored by: SAS

    In this white paper, explore the increasing regulatory pressures putting procurement fraud in a bright light, and review how to combat procurement fraud within your organization with SAS software.

  • The Most Common Types of Invoice Fraud and How to Prevent Them

    Sponsored by: AppZen

    How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.

  • AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism

    Sponsored by: SAS

    Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.

  • Keeping Fraud Detection Software Aligned With the Latest Threats

    Sponsored by: SAS

    Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.

  • How to Succeed With Fraud Analytics

    Sponsored by: SAS

    Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.

  • Fraud Investigation Management

    Sponsored by: TIBCO

    Download this webcast to learn about a 5 layer approach to fraud management, so your organization can become more proactive and not just reactive.

  • How to Deal with Fraudulent Counterfeit Apps

    Sponsored by: Data Theorem

    A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.

  • Understanding Email Fraud

    Sponsored by: Proofpoint

    Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.

  • 2019 Threat Report: Email Fraud in Financial Services

    Sponsored by: Proofpoint

    Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • Can Your ID Verification Solution Stand the Heat?

    Sponsored by: Onfido

    Learn how you can exceed your customers' expectations with faster, more accurate ID verification that eliminates even the most sophisticated fraud attempts.

  • Are you Using the Best Approach to Catch Digital Identity Fraud?

    Sponsored by: Onfido

    In an all-digital world, ID theft is everywhere. With the data of hundreds of millions of consumers compromised, personally identifiable information can no longer be the cornerstone of online identity verification (IDV) methods. Read on to explore why traditional IDV solutions are failing to defeat identity fraud and how a hybrid IDV can help.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.