ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime

    Sponsored by: ArcSight, an HP Company

    When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • E-Book: Red Flag Rules Compliance

    Sponsored by: Gemalto

    SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.

  • Defining Identity Management

    Sponsored by: Hitachi ID Systems, Inc.

    This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

  • Security Threat Report: 2010

    Sponsored by: Sophos UK

    The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  • Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection

    Sponsored by: Panda Security

    Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.

  • E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime

    Sponsored by: TechTarget Security

    As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Credit Issuers: Stop Application Fraud At The Source With Device Reputation

    Sponsored by: iovation, Inc.

    Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.

  • Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud

    Sponsored by: iovation, Inc.

    Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.

  • Data Breach Case Study: Heartland Payment Systems

    Sponsored by: Sourcefire

    Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.

  • Presentation Transcript: Phishing and the Underground Economy

    Sponsored by: MarkMonitor

    This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.

  • Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved

    Sponsored by: MarkMonitor

    This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.

  • PCI DSS Success: Archiving Compliance and Increasing Web Application Security

    Sponsored by: Citrix

    This paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..

  • Methods, Motivations, and Mitigation of Insider Threats

    Sponsored by: VeriSign, Inc

    This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.

  • Kaspersky Internet Security 7.0

    Sponsored by: Kaspersky

    Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.

  • Pod Slurping - An Easy Technique for Stealing Data

    Sponsored by: GFI Software

    In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.