ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Research

  • Norton Cyber Security Insights Report

    Sponsored by: ComputerWeekly.com

    This report examines consumers' online behaviours, attitudes and security habits alongside the dangers and financial cost of cyber crime

  • Cybercrime and warfare: All that matters

    Sponsored by: ComputerWeekly.com

    Peter Warren and Michael Streeter assess  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.

  • The identity perimeter

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.

  • Underexposed risks of public Wi-Fi hotspots

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi  hotspots.

  • The Deloitte Consumer Review: A more secure customer

    Sponsored by: ComputerWeekly.com

    This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.

  • Mobile Security Strategies

    Sponsored by: ComputerWeekly.com

    This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.

  • The various ways to fight new and emerging cybercrime

    Sponsored by: SearchSecurity.com

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

  • 5 Steps to Raising Ransomware Resistance

    Sponsored by: SearchSecurity.com

    This TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.

  • Time for an IAM Overhaul

    Sponsored by: SearchSecurity.com

    IAM security policies must take into account the latest technology developments, especially cloud and the Internet of Things. Access this three-part technical guide to gain valuable information on IAM strategy in the face of rapidly evolving technology.

  • Information Security Asean November 2015

    Sponsored by: TechTarget ANZ

    The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it

  • Information Security ASEAN March 2015

    Sponsored by: SearchSecurity.com

    Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.

  • Information Security ANZ March 2015

    Sponsored by: SearchSecurity.com

    Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.

  • What to Look for in Web Application Firewall Products

    Sponsored by: SearchSecurity.com

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Information Security ANZ November

    Sponsored by: SearchSecurity.com

    In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.

  • Internet-Scale Identity Systems:An Overview and Comparison

    Sponsored by: Ping Identity Corporation

    This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Presentation Transcript: Automating Access Certification in Just 17 Days

    Sponsored by: Aveksa

    This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process.

  • SonicWALL PCI Compliance Solution Brief

    Sponsored by: SonicWALL

    The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

  • E-Guide: Basic Techniques to Prevent Identity Theft and Cybercrime

    Sponsored by: ArcSight, an HP Company

    When it comes to cybercrime, identity theft techniques often vary from the technical -- computer forensics -- to the old-school -- calling victims to gather personal information. In this guide, our expert covers basic techniques to prevent identity theft.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • E-Book: Red Flag Rules Compliance

    Sponsored by: Gemalto

    SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.

  • Defining Identity Management

    Sponsored by: Hitachi ID Systems, Inc.

    This document defines the components of identity management, starting with the underlying business challenges of managing user identities and entitlements across multiple systems and applications. Identity management functions are defined in the context of these challenges.

  • Security Threat Report: 2010

    Sponsored by: Sophos UK

    The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.

  • Case Study: Data Solutions, Inc. Protects its Clients with Panda Cloud Office Protection

    Sponsored by: Panda Security

    Read this case study to learn how Data Solutions, Inc. gained the ability to handle remote management from a single point, to handle remote installation and management of all clients, to reduce service management operating costs, and to prevent identity theft by implementing Panda Cloud Office Protection.

  • E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime

    Sponsored by: SearchSecurity.com

    As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.