Fraud Management Reports

9 Common Cryptocurrency Scams in 2023
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Even though cryptocurrency is a newer trend, thieves are using old methods to steal. Here are some of the common cryptocurrency scams to watch out for.
Posted: 14 Sep 2022 | Published: 14 Sep 2022

TechTarget ComputerWeekly.com

Traditional Threat Management vs. AI-Driven Threat Intelligence
sponsored by Bottomline Technologies, Inc.
EGUIDE: As traditional antivirus programs and intrusion detection systems become ineffective against ransomware and advanced persistent threats, it’s become imperative for organizations to take proactive approaches – such as AI-driven threat intelligence. Take the survey to access Traditional Threat Management vs. AI-Driven Threat Intelligence.
Posted: 10 Dec 2021 | Published: 25 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
sponsored by MarkMonitor
CASE STUDY: Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

SWIFT Banking System Boosts Security Following Cyberattacks
sponsored by BAE Systems Applied Intelligence
EGUIDE: Following a number of attacks on the SWIFT banking system that led to the theft of millions of dollars, SWIFT promised new rules to improve security for bank transfers. In this e-guide, we examine these targeted malware attacks and explore SWIFT's response to them. Find out if their 5-part strategic program was enough to bolster security.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

All resources sponsored by BAE Systems Applied Intelligence

Cloud Computing Insider Threats: Exploring Risk Scenarios, Mitigations
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide highlights possible insider threat scenarios, as well as 11 security issues to consider when choosing a cloud service provider.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Dell, Inc. and Intel®

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process.
Posted: 18 Sep 2009 | Published: 22 Jun 2009

iovation, Inc.

Securities and capital markets
sponsored by IBM
WHITE PAPER: IBM®ILOG®’s business rule management system (BRMS) is widely used by leading investment banks, asset management and mutual fund firms to meet their compliance requirements while adding intelligent decisioning capabilities to applications and processes throughout the trading cycle, and business channels and systems.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

IBM