Fraud Management Reports

Traditional Threat Management vs. AI-Driven Threat Intelligence
sponsored by Bottomline Technologies, Inc.
EGUIDE: As traditional antivirus programs and intrusion detection systems become ineffective against ransomware and advanced persistent threats, it’s become imperative for organizations to take proactive approaches – such as AI-driven threat intelligence. Take the survey to access Traditional Threat Management vs. AI-Driven Threat Intelligence.
Posted: 10 Dec 2021 | Published: 25 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

How do cybercriminals steal credit card information?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cybercriminals have several methods at their disposal to hack and exploit credit card information. Learn about these, how to prevent them and what to do when hacked.
Posted: 18 Jan 2023 | Published: 16 Jan 2023

TechTarget ComputerWeekly.com

7 top predictive analytics use cases
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Across industries, companies are using predictive analytics to forecast future trends and actions. Learn about the most popular use cases for predictive analytics.
Posted: 15 Feb 2023 | Published: 16 Feb 2023

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

WagerWorks Takes Fraudsters Out of the Game Using iovation Device Reputation
sponsored by iovation, Inc.
CASE STUDY: In this paper WagerWorks covers how to deal with fraud challenges and resolution requirements of the casino industry.
Posted: 14 Dec 2009 | Published: 11 Dec 2009

iovation, Inc.

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

As data grows, so do the risks: How to improve data and app sec
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a combination of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 06 Nov 2013 | Published: 30 Sep 2012

IBM

The Deloitte Consumer Review: A more secure customer
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget ComputerWeekly.com