fraud

Results 1 - 25 of 330Sort Results By: Published Date | Title | Company Name
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: Pindrop Security     Published Date: Apr 26, 2018
As fraudsters grow in sophistication and experience, they often aren’t acting alone. Syndicated crime rings are big business around the world. In the fraud economy, different fraudsters specialize in different aspects of the attack, from gathering data and creating profiles of targeted victims, to socially engineering call center agents, to creating tools like robotic dialers. These fraudsters might work alone, selling their skills on the black market. In other cases, fraudsters are running entire call centers overseas dedicated to executing attacks.
Tags : 
    
Pindrop Security
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
Mobile devices are everywhere. 95% of UK millennials now use smartphones1; and it’s estimated that across the globe, nearly a billion more people now use mobile phones today than did five years ago.2 Mobile commerce will continue to grow as smartphones continue to be adopted. For example, forecasts for Europe’s EU 5 (France, Germany, Italy, Spain and the United Kingdom) show mCommerce will account for 43.8% of eCommerce sales by 2020, compared to 32.9% in 2016.3 As fraud teams determine which orders to accept or reject, fraud managers are key to providing a seamless mobile checkout experience. But they also need to protect their business from fraud – and from the damage it can cause to bottom line, customer experience and brand.
Tags : 
    
CyberSource EMEA
Published By: CyberSource EMEA     Published Date: Jun 28, 2018
It has to be quick and easy for people to pay. At the same time, fraudsters are probing the weaknesses of new digital processes. As the person who can decide whether a transaction is accepted or rejected, fraud managers have a pivotal role. They’re not just preventing losses from chargebacks. They’re gatekeepers to accepting more revenue. It’s a complex job. But get it right, and they enable their business to engage customers better – across devices and places. And that can mean supporting the very growth of the business. In this landscape, the idea that a technology like machine learning might be the answer to all the industry’s needs is attractive. But while machine learning should be a key part of an effective fraud strategy, the truth is that there’s no silver bullet. So, in this paper, we’ll look at how best to put machine learning to use. By employing it in tandem with expert insight, merchants can use it to accept the optimal number of payments. And make a direct impact on the
Tags : 
    
CyberSource EMEA
Published By: Abacus Labs     Published Date: Jun 14, 2018
The purpose of expense reporting software is to streamline your team’s workflow for submitting and reviewing business expenditures. By implementing an expense management solution, you can decrease the time and costs associated with processing expenses and increase your visibility into the implications of business spend, while helping improve general expense policy compliance and reduce expense fraud.
Tags : 
reporting, software, expense, finance, business, management
    
Abacus Labs
Published By: IBM     Published Date: May 02, 2018
Learn what factors to consider in making your business case for digital identity fraud detection.
Tags : 
identity fraud, security, fraud detection
    
IBM
Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound
    
Nuance Communications
Published By: Nuance Communications     Published Date: Jun 17, 2009
The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk
    
Nuance Communications
Published By: Nuance Communications     Published Date: May 28, 2010
Register today to view to the webcast Proactive Notifications for Financial Services: Using Automated Customer Communications to Manage Risk and Retain Customers.
Tags : 
nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, financial services
    
Nuance Communications
Published By: SAS     Published Date: Jan 17, 2018
First, today’s digitally oriented customers expect banks to provide an ever-higher quality experience defined by speed and the flexibility to conduct business across many channels. They’ve grown accustomed to going online and transferring money between accounts, for example, and using their mobile device to make payments and check their account balance. These kinds of experiences have raised the bar in terms of customer expectations – and banks need to keep up, or risk losing customers. This is particularly true of millennial customers, as they have little regard for loyalty, which banks have traditionally relied on to build their business. Once frustrated by inconvenience, they don’t hesitate to switch banks – and thanks to the internet, this is now a fast, painless process.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
Financial institutions (FIs) must support the channels and services that consumers demand in order to remain competitive with each other and with disruptive competitors. To that end, supporting account opening, delivering new transactional features, and facilitating payments through digital channels have become table stakes. Unfortunately, the speed and convenience that these capabilities afford is a benefit to consumers and fraudsters alike. To successfully prevent fraud while retaining the benefits of offering digital financial services, FIs must understand how fraudsters are exploiting these capabilities and fight fraud with customer experience in mind.
Tags : 
    
SAS
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Akamai Technologies Australia     Published Date: Feb 07, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
    
Akamai Technologies Australia
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A fundamental people-process-technology transformation enables businesses to remain competitive in today’s innovation economy. Initiatives such as advanced security, fraud detection services, connected consumer Internet of Things (IoT) devices, augmented or virtual reality experience, machine and deep learning, and cognitively enabled applications drive superior business outcomes such as predictive marketing and maintenance. Superior business outcomes require businesses to consider IT a core competency. For IT, an agile, elastic, and scalable IT infrastructure forms the crucial underpinning for a superior service delivery model. The more up to date the infrastructure, the more capable it is of supporting the scale and complexity of a changing application landscape. Current-generation applications must be supplemented and eventually supplanted with next-generation (also known as cloud-native) applications — each with very different infrastructure requirements. Keeping infrastructure up
Tags : 
    
Dell EMC & Intel
Published By: KeyBank Commercial Banking     Published Date: May 10, 2017
When it comes to the middle market, Key has a dedication like no other bank. Our commitment and focus allow us to deliver relevant, actionable, and tailored solutions for middle market companies. As part of this commitment, KeyBank conducts quarterly surveys with middle market executives. We believe that the more we know, the better we can serve you. Check out what leaders are saying about the economy, future growth and cybersecurity when you download our latest quarterly report. Member FDIC. © 2017, KeyCorp. CFMA 20170424- 224928
Tags : 
middle market, us economy, economic outlook, customized solutions, cybersecurity, business success, business goals, business expansion, financial outlook, fraud, business growth, m&a
    
KeyBank Commercial Banking
Published By: Key Private Bank     Published Date: Aug 23, 2017
"The latest Key Private Bank whitepaper takes a deeper look at the types, methods and impacts of fraud and identity theft - and how you can prepare and protect your family and your wealth from this growing threat. ©2017 KeyCorp. E89861 170620-248192"
Tags : 
identity theft, fraud, wealth protection, fraud prevention, prepare, cybercrime, cyberattack, phishing, types of fraud
    
Key Private Bank
Published By: SAS     Published Date: Jul 14, 2015
An Enterprise Approach to Fraud Detection and Prevention in Government Programs.
Tags : 
fraud, detection, prevention, cost savings, efficiency
    
SAS
Published By: Akamai Technologies     Published Date: Sep 11, 2017
A compromised account is 17 times more valuable than a stolen credit card number. That’s why fraud bots, loaded with stolen credentials, use their lists of username/password pairs on thousands of websites. Credential stuffing bots can lead to data theft, customer identity fraud, and account takeover on your site. Learn about the risk to your business from credential stuffing bots in the Akamai infographic, Credential Stuffing 101: The Risk of Bots to Your Business.
Tags : 
credential stuffing, bot security, akamai, cyber security
    
Akamai Technologies
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking, wireless, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless, storage, business technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: Q2 eBanking     Published Date: Oct 24, 2017
The proliferation of fraud is an unpleasant reality. But the dispute management workload that fraud creates doesn’t have to be as unpleasant, or as unmanageable, as it is today.
Tags : 
    
Q2 eBanking
Published By: Q2 eBanking     Published Date: Oct 24, 2017
Banks and credit unions can prevent fraudsters and other cybercriminals from gaining an upper hand on them by using more sophisticated protection. This protection is found in five layers of proactive security defense. Q2’s paper, Multilayer Security— Because a moat is not enough, discusses these essential layers to keeping account holders secure.
Tags : 
    
Q2 eBanking
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com