Searched for: "fraud risk management"
- Security (44)
- Cxo (12)
- Big Data (11)
- Banking (5)
- Data Management (5)
- Data Centers (4)
- Software (4)
- Cloud (3)
- Tech & Work (3)
- After Hours (2)
- Developer (2)
- Enterprise Software (2)
- Hardware (2)
- Microsoft (2)
- Networking (2)
- Project Management (2)
- Mobility (1)
- Social Enterprise (1)
- Start-Ups (1)
- Tech Industry (1)
About 109 results for "fraud risk management"
Machine data is a goldmine and is growing fast. IT leaders, says Splunk's Tapan Bhatt, need to leverage it and gain greater insights into security and their customers.
IBM Security Identity Governance is designed to help organizations effectively manage identities and application access by bridging the gaps across compliance, business and IT infr...
IBM Security QRadar and IBM Security identity and access management solutions deliver out-of-the-box integration, enabling organizations to quickly identify anomalies in user behav...
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters...
Despite high demand for cybersecurity insurance, insurers are playing it safe. EY's Robert Reeves recommends drafting the policy you want, and then shopping it around.
Startup AppZen uses natural language processing and machine learning to automate the process of expense reports. Here's how.
Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. WSNs must be secured to prevent an i...
Payment card fraud losses for the card payment industry are generating billions of dollars. In addition to direct damage, the brand name due to fraud can be affected by a lack of c...
Cognitive computing analyzes how the brain works and approximates human intelligence. Find out how businesses might benefit from this new frontier in data analytics.
The hack of Apple Pay competitor CurrentC, combined with its primary objective of using insecure ACH transfers to sidestep the credit cards, is a setup for disaster, says James San...