Identity Theft Research
-
E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime
Sponsored by: ArcSight, an HP CompanyWhen it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.
-
Basic Building Blocks: Preparing for PCI DSS 2.0
Sponsored by: Veracode, Inc.With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
-
E-Book: Red Flag Rules Compliance
Sponsored by: GemaltoSearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
-
Defining Identity Management
Sponsored by: Hitachi ID Systems, Inc.This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.
-
Security Threat Report: 2010
Sponsored by: Sophos UKThe first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
-
Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection
Sponsored by: Panda SecurityRead this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.
-
E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime
Sponsored by: TechTarget SecurityAs our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
Credit Issuers: Stop Application Fraud At The Source With Device Reputation
Sponsored by: iovation, Inc.Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
-
Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
Sponsored by: iovation, Inc.Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
-
Data Breach Case Study: Heartland Payment Systems
Sponsored by: SourcefireRead this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
-
Presentation Transcript: Phishing and the Underground Economy
Sponsored by: MarkMonitorThis document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
-
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
Sponsored by: MarkMonitorThis white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
-
PCI DSS Success: Archiving Compliance and Increasing Web Application Security
Sponsored by: CitrixThis paper elaborates on the changing nature of the PCI DDS landscape and its requirements. It also identifies applicable application network compliance solutions from Citrix Systems Inc..
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Kaspersky Internet Security 7.0
Sponsored by: KasperskyTry this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
-
DigitalPersona Pro
Sponsored by: DigitalPersonaThis free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.
-
Cascading Risk
Sponsored by: Core Security TechnologiesThis webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Pod Slurping - An Easy Technique for Stealing Data
Sponsored by: GFI SoftwareIn this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.