Online Fraud Protection Reports

Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE: Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

AI in Fraud Management: Uses cases, benefits and challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: AI is involved in many cybersecurity processes. Now, AI has its sights set on improving the fraud detection and management landscape. In this e-guide, learn about the use cases, as well as the benefits and challenges organisations should keep in mind when implementing AI into their fraud detection and management processes.
Posted: 01 Mar 2023 | Published: 08 Mar 2023

TechTarget ComputerWeekly.com

Compliant Statement Archiving and Presentment for Financial Services
sponsored by EMC Corporation
WHITE PAPER: Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

EMC Corporation

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

E-Book: Red Flag Rules Compliance
sponsored by Gemalto
EBOOK: SearchFinancialSecurity.com presents a comprehensive guide to Red Flag Rules compliance. Our experts cover all the angles with authoritative technical advice on: using a risk-based approach for compliance; specific examples of red flags; clarification of the guidance; and what industry organizations are doing to help victims.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

Gemalto

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

IBM Intelligent Investigation Manager
sponsored by IBM
WEBCAST: View this webcast to explore an intelligent investigation platform that proactively investigates, prevents, detects, and discovers fraud cases.
Posted: 16 Jan 2014 | Premiered: Mar 13, 2013

IBM