Searched for: "fraud risk management"
- Security (43)
- Big Data (12)
- Cxo (11)
- Banking (5)
- Data Management (5)
- Data Centers (4)
- Software (4)
- Cloud (3)
- Tech & Work (3)
- After Hours (2)
- Developer (2)
- Enterprise Software (2)
- Hardware (2)
- Microsoft (2)
- Networking (2)
- Project Management (2)
- Mobility (1)
- Social Enterprise (1)
- Start-Ups (1)
- Tech Industry (1)
About 108 results for "fraud risk management"
Read about one company's five-step data evolution process for getting a holistic view of ROI and risk management in data centers.
The purpose of threat intelligence, says Webroot's CMO, is to immediately block cyberthreats through your network and endpoints, and to predict where attacks originate.
Machine data is a goldmine and is growing fast. IT leaders, says Splunk's Tapan Bhatt, need to leverage it and gain greater insights into security and their customers.
IBM Security QRadar and IBM Security identity and access management solutions deliver out-of-the-box integration, enabling organizations to quickly identify anomalies in user behav...
With the introduction of sophisticated threats such as advanced phishing and malware, authentication can become less effective. Authentication methods can be bypassed by fraudsters...
IBM Security Identity Governance is designed to help organizations effectively manage identities and application access by bridging the gaps across compliance, business and IT infr...
Despite high demand for cybersecurity insurance, insurers are playing it safe. EY's Robert Reeves recommends drafting the policy you want, and then shopping it around.
Startup AppZen uses natural language processing and machine learning to automate the process of expense reports. Here's how.
Payment card fraud losses for the card payment industry are generating billions of dollars. In addition to direct damage, the brand name due to fraud can be affected by a lack of c...
Wireless sensor networks processing sensitive data are facing the risks of data manipulation, data fraud and sensor destruction or replacement. WSNs must be secured to prevent an i...