Retail Fraud Protection Reports

Ultimate Guide to Incident Response and Management
sponsored by Bottomline Technologies, Inc.
EGUIDE: Incident response (IR) planning should be your top priority to minimize any security vulnerabilities that will allow hackers to invade your network. Take the survey to access the Ultimate Guide to Incident Response and Management.
Posted: 10 Dec 2021 | Published: 28 Oct 2021

All resources sponsored by Bottomline Technologies, Inc.

Fraud management: A perennial business issue
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we will explore the current cyber fraud landscape and look at some organisations in the region that are using technology to overcome the challenges posed by fraudsters.
Posted: 06 Jul 2021 | Published: 06 Jul 2021

TechTarget ComputerWeekly.com

Network Security: Spotlight on Australia/New Zealand
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging cyber threats.
Posted: 08 Feb 2021 | Published: 21 Jun 2018

TechTarget ComputerWeekly.com

Giving Customers Better Protection While Reducing Costs
sponsored by ThreatMetrix
CASE STUDY: This case study outlines a top e-commerce business and their strategy for preventing fraud, lowering costs and ensuring consumer trust.
Posted: 26 Mar 2014 | Published: 31 Dec 2013

ThreatMetrix

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

How to prevent phishing attacks: User awareness and training
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

TechTarget Security

The Deloitte Consumer Review: A more secure customer
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget ComputerWeekly.com

A Computer Weekly buyer’s guide to blockchain technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Blockchain technology is increasingly showing its value to business. In this 15-page buyer's guide, Computer Weekly looks at the challenges the technology still needs to overcome, how it's shaping the use of data and what it can do for information security professionals.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

TechTarget ComputerWeekly.com

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Basic Building Blocks: Preparing for PCI DSS 2.0
sponsored by Veracode, Inc.
WEBCAST: With their own reputation and brands at risk, merchants and service providers must secure applications from potential vulnerabilities to comply with PCI DSS standards.
Posted: 04 Oct 2010 | Premiered: Oct 4, 2010

Veracode, Inc.