Fraud Management Reports

A Computer Weekly buyer's guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 08 Feb 2021 | Published: 16 Oct 2019

TechTarget ComputerWeekly.com

8 big data use cases for businesses and industry examples
sponsored by TechTarget ComputerWeekly.com
EGUIDE: For businesses, the ability to deal with big data is important: it can bring companies significant business value, from enabling cost optimization and improved efficiency to providing better customer insight. In this article, we'll explore 8 use cases that show big data's profound impact on businesses across different industry sectors.
Posted: 09 Feb 2023 | Published: 09 Feb 2023

TechTarget ComputerWeekly.com

Top 10 enterprise IT in the Benelux region stories of 2019
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Netherlands is usually seen as a forward-thinking nation when it comes to developing and adopting the latest IT, but it seems its government is not doing particularly well in this respect. Here are Computer Weekly's top enterprise IT in the Benelux region stories of 2019.
Posted: 08 Feb 2021 | Published: 03 Jan 2020

TechTarget ComputerWeekly.com

Boost Compliance in Accounting with AI
sponsored by ServiceNow
EGUIDE: View this e-guide to learn how accounting and finance teams can improve productivity, maintain compliance, and boost fraud protection through the incorporation of AI-based systems.
Posted: 12 Sep 2019 | Published: 06 Sep 2019

ServiceNow

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

A Computer Weekly buyer’s guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

Cyberthreats and Risks in the Payment Card Industry
sponsored by Jumio
EGUIDE: Find out how you can prevent and protect your enterprise against fraudsters in the payment card industry.
Posted: 22 Jun 2018 | Published: 20 Jun 2018

Jumio

The Massachusetts Data Protection Law
sponsored by TechTarget Security
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

TechTarget Security