Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Proactive Cyber Defense with Intelligent SIEM Platforms
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security...
Learn more
Blog
Blog
Three Critical Elements Required to Close the Cybersecurity Skills Gap
The status on cybersecurity is fairly clear: 82% of employers report that their cybersecurity skills are not enough to handle the rising number of cyber incidents ( Center for Strategic &...
Learn more
Market Compass
Market Compass
Security Operations Center as a Service (SOCaaS)
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service...
Learn more
Event Recording
Event Recording
CSLS Wrap Up and Closing Keynote
Learn more
Generative AI in Cybersecurity – It's a Matter of Trust
Blog
Generative AI in Cybersecurity – It's a Matter of Trust
We cannot deny the fact that Generative AI is a game-changer in almost every industry, including cybersecurity. And yet it is critical for everyone to understand that GenAI does not do magic. It is...
Threat Detection and Incident Response
Blog
Threat Detection and Incident Response
Organizations and society in general have become more and more dependent on IT delivered services. This has increased the potential impact of risks from cyber-attacks. Cybersecurity needs to meet...
Cyber Security Evolve or Die
Blog
Cyber Security Evolve or Die
Cyber security is never done – you need to constantly work to improve your organization’s cyber security readiness. Cyber adversaries never sleep and the geopolitical tensions across the world are...
Reflections on the Okta Breaches: We All Live in Glass Houses Now
Blog
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s...
Why GPTs are a Relationship Store, Not an App Store
Blog
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
Blog
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance.
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
Foresight Consulting in Cybersecurity
Blog
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Blog
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of...
Cyberkriminalität profitiert von sicheren Häfen
Blog
Cyberkriminalität profitiert von sicheren Häfen
Cyberkriminelle nutzen Desinformationskampagnen, um Informationssicherheitssysteme auszuhöhlen. Unser Gespräch mit dem Chefredakteur des Tagesspiegel Background Cybersecurity beleuchtet, wie der...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
1 2 3 4 5 6 7 Next