Online Fraud Management Reports

10 common uses for machine learning applications in business
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Machine learning (ML) enables businesses to perform tasks on a scale previously thought impossible. As a result, many organizations are finding ways to harness ML to not just drive efficiencies but to fuel new business opportunities. Here are 10 applications of ML that are being used to solve problems & deliver tangible business benefits:
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC 2014 WW MarketScape Report for Federated Identity Management and SSO
sponsored by IBM
WHITE PAPER: Find out how vendors fared in IDC's assessment of IAM offerings for federated identity management and single sign-on.
Posted: 08 Oct 2014 | Published: 31 Mar 2014

IBM

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

How retailers can manage customer data collection to decrease fraud
sponsored by SonicWALL
EGUIDE: This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY: Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009

Sourcefire

Entraction Uses Device Reputation to Carry Out "Zero Tolerance" for Fraud
sponsored by iovation, Inc.
CASE STUDY: Entraction has no reservations about the effectiveness and efficiencies that are possible using device fingerprinting paired with device reputation; this is real data pulled from the user's computer, coupled with fact-based evidence of fraud from that computer's past. Read this case study to learn about how Entraction is fighting fraud.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.