Fraud Detection White Papers

(View All Report Types)
Credit Issuers: Stop Application Fraud At The Source With Device Reputation
sponsored by iovation, Inc.
WHITE PAPER: Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

Compliant Statement Archiving and Presentment for Financial Services
sponsored by EMC Corporation
WHITE PAPER: Read this white paper to learn how, by adapting a managed approach to archiving and presenting customer statements, financial services organizations can satisfy regulatory, good governance, and legal requirements.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

EMC Corporation

Data, Disconnected: Communications Firms Take the Necessary Steps to Build Greater Accuracy into Their Customer Management Processes
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: This white paper for the communications sector examines how inaccurate data can impact customer relationships and how implementing a multi-phase process can help feed cleaner customer data into enterprise solutions to maximize return on investment.
Posted: 20 Jan 2009 | Published: 20 Jan 2009

Pitney Bowes Group 1 Software

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Online Dating: Keeping Your Members Safe from Online Scams and Predators
sponsored by iovation, Inc.
WHITE PAPER: This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

iovation, Inc.

4 Ways to Master Employee Growth and Development with AI
sponsored by ServiceNow
WHITE PAPER: HR and business leaders must adapt to the changing landscape and invest in modern approaches and technology to foster sustainable and systematic employee development. This paper explores four key trends that can help future-proof your workforce.
Posted: 06 Oct 2023 | Published: 06 Oct 2023

TOPICS:  IT Management
ServiceNow

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.