Fraud Protection Research
-
The various ways to fight new and emerging cybercrime
Sponsored by: TechTarget SecurityCybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.
-
How to prevent phishing attacks: User awareness and training
Sponsored by: TechTarget SecurityThis expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
-
Giving Customers Better Protection While Reducing Costs
Sponsored by: ThreatMetrixThis case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
-
Leverage Security Intelligence for Retail
Sponsored by: IBMThis informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
-
Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
Sponsored by: Dell, Inc. and Intel®This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
-
Fighting Fraud on Fridays
Sponsored by: IBMView the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
-
IBM Intelligent Investigation Manager
Sponsored by: IBMView this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
-
Better Security Intelligence for the Finance Industry
Sponsored by: IBMA security intelligence platform is a key element for fighting the many threats the financial institution faces, and this white papers describes on such platform.
-
As data grows, so do the risks: How to improve data and app sec
Sponsored by: IBMAccess this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: TechTarget ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
ebizQ.net Tip Guide: Evolving your dynamic case management strategy
Sponsored by: IBMThis Tip Guide describes how DCM can benefit financial services firms and offers expert advice on best practices and pitfalls in DCM adoption.
-
SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
Sponsored by: IBMThis expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
-
IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
Sponsored by: IBMAs hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance. Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
-
Client Case Study: Bouyges Telecom
Sponsored by: IBMIn this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.
-
Client Case Study: London Borough of Brent
Sponsored by: IBMThis paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud.
-
Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive
Sponsored by: IBMThis paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action.
-
Threat and Fraud Prevention
Sponsored by: IBMThis white paper explores these features, and the challenges that organizations face related to making sense of information in order to revolutionize their ability to mitigate threat and fraud.
-
Securities and capital markets
Sponsored by: IBMIBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
-
Fraud Prevention and Detection for Credit and Debit Card Transactions
Sponsored by: IBMOver the past 20 years, financial institutions, governments, insurers and retailers have seen an explosion in the amount and types of fraud perpetrated against them.
-
Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
Sponsored by: Oracle CorporationOracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
-
IBM InfoSphere Guardium Data Redaction
Sponsored by: IBMInfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
-
How retailers can manage customer data collection to decrease fraud
Sponsored by: SonicWALLThis expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
-
Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
Sponsored by: ArcSight, an HP CompanyThis webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
-
Database Security Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
Sponsored by: Information Security MagazineThis month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.