ComputerWeekly.com Research Library

Powered by Bitpipe.com

Fraud Protection Research

  • Live Threat Briefing New Attack Trends in Retail

    Sponsored by: Shape Security

    Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques.

  • Procurement Integrity Powered by Continuous Data Monitoring

    Sponsored by: SAS

    In this white paper, explore the increasing regulatory pressures putting procurement fraud in a bright light, and review how to combat procurement fraud within your organization with SAS software.

  • The Most Common Types of Invoice Fraud and How to Prevent Them

    Sponsored by: AppZen

    How can your business prevent falling prey to invoice fraud schemes? Knowing exactly what to look out for is an important first step. Download this e-book to learn about the most common types of invoice fraud and how to prevent them.

  • AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism

    Sponsored by: SAS

    Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.

  • Keeping Fraud Detection Software Aligned With the Latest Threats

    Sponsored by: SAS

    Fraud and financial crimes weren't considered serious issues until the 1980s. Since then, they have become commonplace. As fraud changes and evolves, organizations must keep anti-fraud software current to detect new and emerging threats. In this white paper, learn how SAS Visual Investigator can help organizations do this.

  • How to Succeed With Fraud Analytics

    Sponsored by: SAS

    Leading-edge analytics and hybrid modeling techniques are finding threats faster and more accurately than ever—and embedded machine learning enhances every step of the process. Read this white paper to learn the 4 flavors of fraud analytics and how you can succeed with them.

  • Fraud Investigation Management

    Sponsored by: TIBCO

    Download this webcast to learn about a 5 layer approach to fraud management, so your organization can become more proactive and not just reactive.

  • Business Email Compromise Attack Evolution and Prevention

    Sponsored by: Blackberry Cylance

    In this webinar, Cylance Consulting Director Sig Murphy presents a comprehensive overview of the origins of business email compromise and evolving attack trends, providing you the information needed to proactively defend systems and endpoints from future attacks.

  • How to Deal with Fraudulent Counterfeit Apps

    Sponsored by: Data Theorem

    A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.

  • Understanding Email Fraud

    Sponsored by: Proofpoint

    Discover the impacts of email fraud and how organizations are responding to it with an effective, multi-layered defense: people, process, and technology.

  • 2019 Threat Report: Email Fraud in Financial Services

    Sponsored by: Proofpoint

    Email fraud today affects organizations of every size, across every industry, and in every country around the world. The financial services industry, for obvious reasons, is an especially attractive target. In this report, discover recommended security steps you can take to protect your people, data and brand from email fraud attacks.

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • Can Your ID Verification Solution Stand the Heat?

    Sponsored by: Onfido

    Learn how you can exceed your customers' expectations with faster, more accurate ID verification that eliminates even the most sophisticated fraud attempts.

  • Are you Using the Best Approach to Catch Digital Identity Fraud?

    Sponsored by: Onfido

    In an all-digital world, ID theft is everywhere. With the data of hundreds of millions of consumers compromised, personally identifiable information can no longer be the cornerstone of online identity verification (IDV) methods. Read on to explore why traditional IDV solutions are failing to defeat identity fraud and how a hybrid IDV can help.

  • AXCESS Financial Finds & Stops Fraud with Interaction Analytics

    Sponsored by: CallMiner

    AXCESS Financial needed a way to solve their fraud problem. In order to do this they deployed CallMiner Eureka Interaction Analytics which helped them to identify fraudsters. In this case study, learn more about how AXCESS Financial turned insight into prevention using CallMiner Eureka.

  • Digital Transformation in Financial Services

    Sponsored by: Onfido

    It's obvious that traditional ways of proving our identities are no longer secure. So what are financial institutions doing about it? Tune into this webinar to learn about emerging technologies like AI, machine learning and biometrics and how they are changing the face of finance.

  • Fighting Fraud - the Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Read on to learn how your organization can implement identity best practices without adding friction to any digital onboarding experience.

  • Fighting CNP Fraud in Online Electronics Sales

    Sponsored by: Riskified

    With the information provided in this report, discover why addressing fraud is key to scaling operations, expanding internationally, improving CX, and competing against industry giants in the online marketing world.

  • Fighting ATO Attacks

    Sponsored by: Riskified

    Online fraud is becoming more and more sophisticated, as cybercriminals try and keep a step ahead of fraud solutions and tools. In this white paper, learn how your organization can determine when and how to block bad users, notify customers of suspicious login attempts, and request additional verification.

  • Introducing the Fraud Management Solution Buyer's Kit

    Sponsored by: Riskified

    In this eCommerce Fraud Solution Buyer's Kit, Riskified offers a series of resources designed to guide you through the process of assessing your current fraud management performance and understanding which available approaches and solutions can best meet your needs.

  • How to Combat Fraud in 3 Easy Steps

    Sponsored by: Onfido

    There are countless ways fraudsters can slip through the net. That's why organizations need to be able to recognize and analyze all of them to keep ahead competitively. Download this white paper for 3 simple steps to combat identity fraud today.

  • JustGiving Turns to Onfido to Onboard More Customers, and for Seamless Integration

    Sponsored by: Onfido

    In this case study, learn how JustGiving, a leading social platform for charitable giving, was able to prevent fraudulent activity, increase its identity verification rates, and onboard users more quickly by using Onfido.

  • Protect Your Online Business From Credential Stuffing

    Sponsored by: Akamai Technologies

    Understanding credential stuffing threats, their increasing sophistication, and the best approaches for stopping them can help you safeguard your business. In this white paper, explore a bot management system that can help you successfully manage and mitigate credential stuffing attacks today.

  • Managing Fraud Risk in the Digital Age

    Sponsored by: SAS

    Learn how to detect, prevent and manage fraud in real time – from a single platform and uncover 4 steps your organization can take to fight fraud.

  • Detecting and Preventing Banking Application Fraud

    Sponsored by: SAS

    Preventing application fraud starts with validating the identity of an individual using a digital device. Are they really who they say they are? Download this white paper for analytics-driven methods for validating financial services applications and spotting trouble at all three stages of bust-out fraud schemes.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.