Compliance Week
 

fraud

Results 176 - 200 of 460Sort Results By: Published Date | Title | Company Name
Published By: TIBCO Software     Published Date: Mar 12, 2019
Fraud affects more than just your customers, it fundamentally destroys your reputation and has significant impact on your bottom line. In the first half of 2018, financial fraud from payment cards, cheques and remote banking totaled £358m in the UK alone, resulting from over a million incidents, an increase of more that 50% over the last 4 years. Have a look at this interesting Infographic to find out more.
Tags : 
fraud, fraud prevention, uk fraud, fraud detection, machine learning
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 20, 2019
The biggest headache for most payment operations teams is cost control — and a large part of it comes from fraud management: Investigation teams waste large amounts of time just assembling the data needed to make decisions. Detection engines are always playing catchup with the latest fraud patterns. Ever changing regulations increase the time and cost required to reach compliance and meet audit standards. Given their scope and impact, replacing core fraud systems is not an option for most firms. But instead of replacing them, you can improve the investigative process with augmented investigation, and improve the detection process by enhancing current systems. This whitepaper describes three ways financial services firms can use TIBCO solutions to lower the cost of investigations through faster results, reduce fraud losses through better detection, and simplify audit and regulatory compliance through centralized access to information.
Tags : 
compliance, audit, fraud, data, detection, transactions, investigation, cost
    
TIBCO Software
Published By: AppZen     Published Date: Jun 17, 2019
Occupational fraud is not a small issue. On average, a company loses 5% of its revenues to employee financial fraud each year, with the annual median loss at $140,000 and over 20% of companies reporting losses of $1 million or more. The key to keeping a lid on this fraud is identifying the fraud before it takes too much of a bite out of the company’s bottom line, or even further, to put processes and controls in place that automatically audits, monitors, and accepts or rejects transactions that don’t fit an recognized pattern.
Tags : 
    
AppZen
Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 12, 2019
A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes, including: Upgrade theft Two-factor authentication bypass Virtual calling When account takeovers became so common that the telecom provider received negative press about the situation, the company knew it needed to find a solution immediately. Download this case study to learn how the company was able to stop credential stuffing with Shape Enterprise Defense.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Oracle     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Whaling attacks have risen in recent months and these emails are more difficult to detect because they don’t contain a malicious hyperlink or attachment, and rely solely on social-engineering to trick their targets. In order to combat these attacks, organizations must be aware of the dangers presented by whaling, or CEO fraud, and put the right safeguards in place. Mimecast conducted a whaling attack survey with 500 organizations around the globe and the results were alarming. Read this report to learn: - The five key phases of a whaling attack - How to protect your organization from a whaling attack through company exercises, education, and technology. - What Mimecast is offering to combat these attacks in its industry-leading Targeted Threat Protection service."
Tags : 
cyber security, cyber fraud, impersonation attacks, ceo fraud, whaling
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them."
Tags : 
email security, email fraud, whaling, mimecast, loss prevention
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Cybercriminals constantly engage organizations in a game of leapfrog: system defenses improve, so malware searches for new holes. Recently, ransomware, which has been around since 1989, has been gaining momentum. Download this Mimecast sponsored report to learn about this growing threat, its impact to organizations and the ways to help thwart an attack."
Tags : 
ransomware, cyber security, mimecast, fraud protection
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
451 Research independent analysts review Mimecast’s Targeted Threat Protection suite of email security services. This report provides detailed descriptions of the various email threat vectors: attachments, links and phishing and how Mimecast email security services work to thwart these attacks. The report covers an overview of the market and specifics on Mimecast services: Impersonation Protect, Attachment Protect, and URL Protect.
Tags : 
email fraud, threat protection, mimecast, cyber security, email security
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Email-borne insider threats both accidental and malicious are a real and ongoing problem for organizations. A recent commissioned study conducted by Forrester Consulting reveals many firms have experienced some form of insider security incident in the past 24 months. Download this report to get the findings. Discover Forrester’s perspective on internal threats and how organizations are responding and how they should be responding."
Tags : 
forrester, insider security, cyber security, internal threats, email fraud
    
Mimecast
Published By: KPMG     Published Date: Jul 31, 2019
Banks need to be agile to respond to threats and embrace new approaches and technologies to predict and prevent fraud. Read our global perspective of how banks are tackling internal and external fraud threats. Read this report to discover: • how banks are deploying resources to optimise their fraud risk management efforts • trends in fraud typologies from investigations and group security professionals • challenges banks are facing in mitigating internal and external threats
Tags : 
    
KPMG
Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
Published By: Google     Published Date: Feb 02, 2018
Machine learning is poised to become the next competitive differentiator. Visionary leaders know this. According to research by Harvard Business Review Analytic Services, 60 percent of business leaders across multiple industries believe the future success of their organisations depends on the application of machine learning (ML). But many leaders still aren’t clear about how to apply ML, according to insights uncovered in this report. Conceptually, ML is the ability for machines to learn without being explicitly programmed. One of ML’s most exciting applications is the ability for companies to train and make predictions from models in real time, which enables businesses to act preemptively before risks materialise as problems. Indeed, 82 percent of respondents are already seeing results from using ML for predictive analytics.
Tags : 
analytics, fraud detection, e-commerce, iot, data, cloud, google
    
Google
Published By: Affirm     Published Date: Jan 22, 2016
You thought EMV was supposed to help eliminate fraud, right? While it will reduce card-present fraud, there is a high likelihood that card-not-present (i.e. e-commerce) fraud will increase now that EMV has been implemented in the U.S.. In fact, experts have predicted an increase in online fraud similar to what was seen after the European rollout of EMV. As a merchant, are you prepared for such an increase? This article describes the EMV implementation and gives actionable tips for how online retailers should prepare in order to avoid a potential onslaught of fraud.
Tags : 
affirm, ecommerce, fraud, risk, emv, online retail
    
Affirm
Published By: FICO     Published Date: Sep 12, 2017
PSD2 puts accountability for unauthorised or fraudulent payments squarely on payment service providers. PSPs are now obliged to confirm their customer’s identity robustly when making payments and when managing their accounts. But these measures threaten to put barriers in the way of the frictionless journey that customers want.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: FICO     Published Date: Sep 12, 2017
PSD2 aims to tackle payments fraud and Strong Customer Authentication is the weapon of choice. Unfortunately, Strong Customer Authentication has a downside, it increases the burden on customers who must prove they are the legitimate account holder more often.
Tags : 
psd2, accountability, security, customer authentication, risk analysis, payment fraud, fico
    
FICO
Published By: CyberSource     Published Date: Sep 28, 2017
Our latest report examines the trends and challenges facing fraud managers today and provides the strategies to address them. Learn how your peers are faring, and see how you compare to them.
Tags : 
    
CyberSource
Published By: Oath     Published Date: Nov 28, 2017
Video is evolving fast, and advertisers want high viewability with completion rates. See how you can deliver with ad fraud prevention, transparency, and the right programmatic partners. Scale your video inventory effectively to make the most revenue. Download now.
Tags : 
    
Oath
Published By: AppZen     Published Date: Jun 17, 2019
Modern finance teams are embracing AI to audit their invoice-based spend. With AI, they can review all of their invoices prior to payment to spot errors, fraud, and contract violations. AppZen customers have identified 16 critical invoice audit and contract compliance use cases that only AI can make possible.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jun 17, 2019
Is your business falling prey to invoice fraud schemes? Download this whitepaper to learn -what to look out for when processing invoices -the best practice of examining thousands of bills that come through the door every month
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 15, 2019
Invoicing and payments problems can take a variety of forms: fraudulent invoices, invoices that don't represent negotiated terms, or just plain duplicates. Join David Wishinsky, Sr. Product Marketing Manager at AppZen, as he reveals 15 critical invoice audit and contract compliance use cases that AI makes possible.
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 15, 2019
Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for over-payment and potential invoice fraud. As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?
Tags : 
    
AppZen
Published By: AppZen     Published Date: Jul 22, 2019
AI helps finance team to reduce spend, ensure compliance and streamline process: - Audit 100% of spend instantly - Comply with regulations like FCPA - Eliminate fraud and waste
Tags : 
    
AppZen
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.