ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Infographic: Business email compromise red flags

    Sponsored by: TechTarget ComputerWeekly.com

    Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

  • Identity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    Identity's place in the attack chain is driving the shift of identity responsibility from IT operations to security. In this e-guide, read about our identity predictions for 2023, how organisations can tame the identity sprawl, and why identity security should be at the core of ASEAN's digital economy.

  • Multifactor authentication: What are the pros and cons?

    Sponsored by: TechTarget ComputerWeekly.com

    One of the biggest shortcomings of traditional user ID and password logins is that passwords can be easily compromised, potentially costing organizations millions of dollars. In this infographic we outline the key pros and cons of adopting multifactor authentication to protect users' identities and secure your systems.

  • Infographic: 5 cybersecurity trends for 2023

    Sponsored by: TechTarget ComputerWeekly.com

    The key cybersecurity trends expected to shape 2023 run the gamut from the human behind the keyboard to tools embedding machine learning. Here's the lowdown on six trends IT services executives expect to encounter this year.

  • Computer Weekly Buyer's Guide: Identity and Access Management

    Sponsored by: TechTarget ComputerWeekly.com

    When used effectively, identity and access management can streamline business processes. In this 17-page buyer's guide, Computer Weekly looks at the challenges it can bring large companies, the implications of cloud and how to pick the right service for your firm.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • How long does it take to get owned?

    Sponsored by: TechTarget ComputerWeekly.com

    A study to investigatethe amount of time that it takes for stolen credentials to be used by a hacker.

  • The various ways to fight new and emerging cybercrime

    Sponsored by: TechTarget Security

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

  • Preventing identity theft in a data breach

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we will explore the links between ransomware attacks, data breaches and identity theft. First, Nicholas Fearn investigates the phenomenon of the double extortion attack, and shares some insider advice on how to stop them, while we'll explore the top five ways data backups can protect against ransomware in the first place.

  • Security Access Controls Over Identities Must Be Priority

    Sponsored by: TechTarget Security

    No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.

  • 4 Top Identity and Access Management Trends

    Sponsored by: Onfido

    As end-user security threats continue to rise, it becomes more crucial for IT pros to have identity and access management tools. However, the tools offered in the identity and access management market are evolving and IT pros need to catch up. In this e-guide, explore the top 4 identity and access management trends shaping the market right now.

  • What to Look for in Web Fraud Detection Systems

    Sponsored by: TechTarget Security

    In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by: TechTarget Security

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Time for an IAM Overhaul

    Sponsored by: TechTarget Security

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • Information Security Asean November 2015

    Sponsored by: TechTarget

    The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it

  • Information Security ASEAN March 2015

    Sponsored by: TechTarget Security

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: TechTarget Security

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • What to Look for in Web Application Firewall Products

    Sponsored by: TechTarget Security

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Information Security ANZ November

    Sponsored by: TechTarget Security

    In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • The Deloitte Consumer Review: A more secure customer

    Sponsored by: TechTarget ComputerWeekly.com

    This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • SonicWALL PCI Compliance Solution Brief

    Sponsored by: SonicWALL

    The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.