Online Fraud Reports

Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE: Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

Computer Weekly – 30 August 2016: Get protected
sponsored by TechTarget ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

Oracle Fusion Governance, Risk, and Compliance Reduces Fraud and Errors to Improve Performance
sponsored by Oracle Corporation
WHITE PAPER: Oracle Fusion GRC Applications improve bottom-line performance by continuously monitoring transactions and applying advanced forensic analysis and embedded application controls across business processes. Learn how you can detect more incidents and respond faster, preventing problems before they escalate or even occur.
Posted: 11 May 2011 | Published: 11 May 2011

Oracle Corporation

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Fighting Fraud on Fridays
sponsored by IBM
WEBCAST: View the following webcast to learn how you can enable more efficient and effective fraud management through intelligent investigation. Uncover the tools and strategies you need to know in order to gain the right fraudulent prowess to help keep you and your business safe.
Posted: 20 Jan 2014 | Premiered: Jan 20, 2014

IBM

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Client Case Study: London Borough of Brent
sponsored by IBM
WHITE PAPER: This paper discusses how Brent used IBM to supply the customer data integration and master data management (MDM) to consolidate back-end systems to reduce administration costs, improve customer service and minimise benefit fraud.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

IBM

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

IBM