Online Fraud Detection Reports

Traditional Threat Management vs. AI-Driven Threat Intelligence
sponsored by Bottomline Technologies, Inc.
EGUIDE: As traditional antivirus programs and intrusion detection systems become ineffective against ransomware and advanced persistent threats, it’s become imperative for organizations to take proactive approaches – such as AI-driven threat intelligence. Take the survey to access Traditional Threat Management vs. AI-Driven Threat Intelligence.
Posted: 10 Dec 2021 | Published: 25 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by TechTarget Security
EBOOK: Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

TechTarget Security

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Client Case Study: Bouyges Telecom
sponsored by IBM
WHITE PAPER: In this case study, Bouygues Telecom uses an analysis platform to help it proactively uncover online and in-store fraud by consumers, dealers and organized crime groups, and prevent the subsequent loss of products and revenue.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

A "How-To" Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Find out how cloud services for security-rich data backup can help your organization avoid the risks involved with data growth.
Posted: 25 Aug 2014 | Published: 30 Sep 2012

IBM

Compliant Statement Archiving and Presentment for Financial Services
sponsored by EMC Corporation
WHITE PAPER: Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

EMC Corporation

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence