Internet Fraud Reports

Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

7 top predictive analytics use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Threat and Fraud Prevention
sponsored by IBM
WHITE PAPER: This white paper explores these features, and the challenges that organizations face related to making sense of information in order to revolutionize their ability to mitigate threat and fraud.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

IBM

Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market
sponsored by ArcSight, an HP Company
WEBCAST: This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.
Posted: 04 Mar 2011 | Premiered: Mar 4, 2011

ArcSight, an HP Company

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Leverage Security Intelligence for Retail
sponsored by IBM
WHITE PAPER: This informative solution brief highlights the challenges and potential solutions that can be implemented to help embrace mobile customers, protect payment and personal data and deliver a secure shopping experience.
Posted: 06 Mar 2014 | Published: 31 Oct 2013

IBM

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

TechTarget ComputerWeekly.com