Close

Top Stories From This Week

Previous Next

Resource Library

Resource Library

7 Item(s)

  • Presented by: ThreatMetrix

    Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

    Quick view Download Now
    White Paper
    Date: September, 2014

    Cybercrime is costly for all online businesses and can no longer be ignored. Well-organized cybercriminals operate in powerful networks that allow them to attack thousands of online businesses using an efficient and scalable model. Download this whitepaper to understand how your online business can use global trust intelligence to combat organized cybercriminals.

    Sponsored by: ThreatMetrix

  • Presented by: ThreatMetrix

    Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.

    Quick view Download Now
    White Paper
    Date: September, 2014

    Discover the most recent trends in online commerce fraud, and how you can leverage the experience of large banks and financial institutions to prevent online fraud at your e-commerce website.

    Sponsored by: ThreatMetrix

  • Presented by: Fathom

    Are you in Google Shopping yet? Is your feed optimized? The clock is ticking. Our guide shows merchants how the new system is different, how to profit from it, and how to generally maintain excellent feeds.

    Quick view Download Now
    Free Guide
    Date: August, 2014

    Google Shopping trumps its own prior product listing ads (PLAs) for average revenue by 34%.*

    Are you in Google Shopping yet? Is your feed optimized? The clock is ticking. Our guide shows merchants how the new system is different, how to profit from it, and how to generally maintain excellent feeds. You will learn:

    – How inventory feed structures, campaigns and ad groups differ in Google Shopping.
    – 4 tips for building out shopping campaigns.
    – How to optimize data feeds and evaluate feed management platforms.
    – 5 great ways to use custom labels for segmentation.

    Navigate the Great Shopping Search Transition: Google Shopping & Data Feed Optimization

    Sponsored by: Fathom

  • Presented by: ROI Revolution

    Download this free report today, give it a quick read, and grow your revenue and profit from the newly revised Google Shopping campaigns.

    Quick view Download Now
    Industry Reports
    Date: May, 2014

    Google Shopping has just undergone a major overhaul in AdWords.

    Upgrading isn't optional. By August 2014, all existing Product Listing Ad campaigns will be forced into this updated structure.

    These new Google Shopping campaigns demand a new level of optimization.

    Read this special report to discover:

    – Which key metrics about your competitors' performance are now accessible.
    (and how to keep this peephole from disappearing!)
    – How to avoid the fresh pitfall of overzealous optimization.
    – The new exhaustively detailed performance data hidden away in an unobvious location.
    (and when to use it.)
    – A simple upgrade plan to keep from losing sales during the forced campaign transition.

    Download this free report today, give it a quick read, and grow your revenue and profit from the newly revised Google Shopping campaigns.

    Sponsored by: ROI Revolution

  • Presented by: Neustar

    Learn how to defuse the three most common types of cyber attacks - distributed denial of service (DDoS), domain name system (DNS) and application layer attacks - and stay one-step ahead of these attackers.

    Quick view Download Now
    IR Thought Leadership
    Date: April, 2014

    How to defuse the growing threat from cyberattacks

    It is no longer a matter of IF e-retailers will be a target of a cyberattack, but WHEN.

    Retail cyberattackers are launching attacks with growing frequency and sophistication—and showing greater ability to evade detection. The net-net: Retailers are more vulnerable than ever.

    Learn how to defuse the three most common types of attacks – distributed denial of service (DDoS), domain name system (DNS) and application layer attacks – and stay one-step ahead of these attackers.

    Sponsored by: Neustar

  • Presented by: LexisNexis

    These downloads spell out what merchants should do right now to mitigate fraud risk and improve profits in 2014.

    Quick view Register
    Webinar
    Date: March, 2014

    Reap the Benefits of eCommerce While Minimizing Fraud

    The recent LexisNexis Post-Holiday webinar: eCommerce, mCommerce and Your Risk Solutions Process summarized the impact of fraud on 2013 holiday business for retailers that accept Internet and mobile transactions—and who doesn't these days? If you missed the webinar, these downloads spell out what merchants should do right now to mitigate fraud risk and improve profits in 2014.

    Download the webinar materials to learn:

    – Key fraud issues affecting the eCommerce & mCommerce space;
    – What you need to know about data breaches and the affect they can have on your business;
    – What steps to take to protect your retail/eCommerce business this year;
    – How to strengthen your authentication and anti-fraud measures; and

    Click through to download the webinar recording and slide deck to get all of the insights from 2013 and learn strategies to improve your outlook for 2014.

    Sponsored by: LexisNexis

  • Presented by: SecureBuy

    SecureBuy has been fighting against “friendly fraud” and “cyber shoplifting” by developing solutions to keep criminals out of the shopping cart.

    Quick view Download Now
    IR Thought Leadership
    Date: March, 2014

    SecureBuy has been fighting against "friendly fraud" and "cyber shoplifting" by developing solutions to keep criminals out of the shopping cart. The recent onslaught of data breaches and FBI warnings of increasing attacks have pushed fraud prevention to the top of many merchants' priority lists. Yet finding the silver bullet to manage e-commerce fraud can be daunting.

    Sponsored by SecureBuy