Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
Learn more
Advisory Note
Advisory Note
Cybersecurity Resilience with Generative AI
Cyberattacks have intensified in recent years. The evolving threat landscape is exemplified by the persistent threat of cyberattacks, driven by cybercriminals' exploration of new tools and...
Learn more
Event Recording
Event Recording
Protect APIs Everywhere with Modern Solutions
Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud...
Learn more
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Join this webinar to learn more about Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into...
Navigating the Future of API Security: Trends, Challenges, and Innovations
Webinar Recording
Navigating the Future of API Security: Trends, Challenges, and Innovations
Join KuppingerCole’s Lead Analyst Alexei Balaganski talking about the need for robust security strategies, the increasing complexity of API ecosystems, and the importance of holistic...
Why GPTs are a Relationship Store, Not an App Store
Blog
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
Blog
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance.
Are You Prepared for the True AD Disaster?
Webinar Recording
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events...
cyberevolution Wrap-Up
Video
cyberevolution Wrap-Up
Conquering Crisis: Effective Strategies for Incident Management
Event Recording
Conquering Crisis: Effective Strategies for Incident Management
Immerse yourself in an in-depth exploration of the strategies of incident management. Through critical examination of real-world cases and emerging trends, they illuminate the integral stages of...
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
Event Recording
Zero Trust in a World of Everything, Everyone, Everywhere, All at Once
In a world where everything and everyone is interconnected, traditional cybersecurity is outdated. Zero Trust, a security framework that assumes nothing can be trusted implicitly, is the...
A Taste of AI & Phishing 2.0, a Data Rodeo
Event Recording
A Taste of AI & Phishing 2.0, a Data Rodeo
This session provides palpable illustrations of the latest LLM technologies and hands-on suggestions on how to tackle the challenges arising from automated, emotionally aware, and generative AI...
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
In today’s volatile cyber landscape, threats are increasingly sophisticated ( e.g. AI-powered ransomware and data exfiltration techniques ), and the regulatory environment is ever-changing....
The Shield of Innovation: How Technology Empowers Fraud Prevention
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications,...
Previous
1 2 3 4 5 6 7 Next