ComputerWeekly.com Research Library

Powered by Bitpipe.com

Identity Theft Multimedia

  • CyberArk Privilege Cloud Whiteboard Video

    Sponsored by: CyberArk Software, Inc

    CyberArk Privilege Cloud can help your organization discover and manage privileged credentials on-premises, in the cloud, and hybrid environments. In this video, Andrew Silberman from CyberArk discusses the benefits of CyberArk Privilege Cloud and helps you evaluate if it is a good fit for your organization.

  • True Cost of Fraud Webinar

    Sponsored by: LexisNexis® Risk Solutions

    The LexisNexis® Risk Solutions 2019 True Cost of Fraud Study provides a snapshot of current fraud trends in the United States and spotlights key pain points that merchants should be aware of as they add new payment mechanisms and expand into online, mobile, and international sectors. Download this webcast to explore key findings from the study.

  • Synthetic Identity - A Rapidly Growing Global Issue

    Sponsored by: RSA

    The RSA Conference eFraud Global Forum brings together anti-fraud leaders from across the world for a candid conversation about e-fraud challenges and solutions. In this webinar, hear from experts in the UK and US as they share the greatest e-fraud challenges they face—including synthetic identity—and how they fight back in this ongoing battle.

  • Zero Trust Access What Does it Mean?

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • Establish Secure DevOps Practices

    Sponsored by: Centrify Corporation

    The introduction of microservices, container-based architectures, and DevOps practices have led to a revolution in software development. However, security can be an afterthought when adopting these. In this webcast, explore DevSecOps and how it can help your organization take the "fast lane" through security into production.

  • 5 Steps to Minimize Your Exposure to Ransomware Attacks

    Sponsored by: Centrify Corporation

    According to the FBI's Internet Crime Complaint Center, the damages associated with ransomware have dramatically increased over the last year. In this webcast, learn what organizations need to know about ransomware attacks and what they can do to minimize the risk of being victimized.

  • The Anatomy of a Hack: Perception vs. Reality

    Sponsored by: Centrify Corporation

    There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.

  • Webinar: Latest Fraud Schemes in Retail and Hospitality

    Sponsored by: Shape Security

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

  • Starbucks Combats Credential Stuffing and Account Takeover

    Sponsored by: Shape Security

    Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • Top 10 Ways to Make Hackers Excited: About the Shortcuts Not Worth Taking

    Sponsored by: RSA Conference

    Designing secure architecture can always be more expensive, time consuming and complicated. But does it make sense to cut corners when hackers invent new attacks every day? Sooner or later, these shortcuts will translate to more harm and backfire. Watch this video from RSA Conference 2019 to learn how to eliminate mistakes.

  • Important Things You Need to Know about Storing Your Identity

    Sponsored by: RSA Conference

    Where do you store your credentials? It's important to know, since technological weaknesses in credential security and misused actions within the operating system can be greatly detrimental to the storage of your credentials. In this session from RSA Conference, learn how to prevent the many technological weaknesses in credential security.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    Learn about the most dangerous new attack techniques in this follow-up to the popular RSA Conference 2019 SANS Institute keynote panel. See how these new threats work, what's coming next, and the best ways to bolster your defense against them. Watch now.

  • The Future of Digital Onboarding

    Sponsored by: Onfido

    Today many of the identity indicators we took for granted are no longer fit for purpose. And with the additional challenge of widespread digital onboarding, it can no longer carry that burden. Tune into this webinar for past and emerging identity trends and how your organization can detect potential fraud.

  • Identity Industry Trends

    Sponsored by: Onfido

    The latest scams are making it almost impossible to know someone's true, human identity. View this video for past and emerging identity trends and how your organization can detect potential fraud.

  • Moving from Simple Authentication to Identity Assurance

    Sponsored by: RSA

    Learn how to take your IAM to the next level, moving from simple authentication (such as static one-time passwords) to the concept of identity assurance.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • Basic Building Blocks: Preparing for PCI DSS 2.0

    Sponsored by: Veracode, Inc.

    With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.

  • An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On

    Sponsored by: Ping Identity Corporation

    Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.

  • Kaspersky Internet Security 7.0

    Sponsored by: Kaspersky Lab

    Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.

  • DigitalPersona Pro

    Sponsored by: DigitalPersona

    This free product demo shows how DigitalPersona Pro can provide your company with biometric authentication for secure single sign-on.

  • Cascading Risk

    Sponsored by: Core Security Technologies

    This webcast identifies the trends towards the outsourcing of business and technology processes, and how that can increase systemic and operational risk within an enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.