Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a...
Learn more
Advisory Note
Advisory Note
EU Digital Operational Resilience Act (DORA)
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption,...
Learn more
Event Recording
Event Recording
Security in the Face of Change: Past Lessons & Prospects for Our Future
The convergence of organizational decentralization, digitization, and global i nstability have raised the need to secure vital infrastructure. Can we learn from the past? Can we prioritize and...
Learn more
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
Blog
The Identity Wallet Distraction: Refocusing on Ironclad Authentication
In the ever-evolving landscape of cybersecurity, Identity and Access Management (IAM) stands as the cornerstone of enterprise security strategies. As security and IT professionals, our focus...
EIC 2024: Don’t Miss These Highlight Sessions
Blog
EIC 2024: Don’t Miss These Highlight Sessions
The European Identity and Cloud Conference 2024 is approaching. Only three more months until EIC 2024 launches in Berlin, June 4th to June 7th.
Generative AI in Cybersecurity – It's a Matter of Trust
Blog
Generative AI in Cybersecurity – It's a Matter of Trust
We cannot deny the fact that Generative AI is a game-changer in almost every industry, including cybersecurity. And yet it is critical for everyone to understand that GenAI does not do magic. It is...
Threat Detection and Incident Response
Blog
Threat Detection and Incident Response
Organizations and society in general have become more and more dependent on IT delivered services. This has increased the potential impact of risks from cyber-attacks. Cybersecurity needs to meet...
Cyber Security Evolve or Die
Blog
Cyber Security Evolve or Die
Cyber security is never done – you need to constantly work to improve your organization’s cyber security readiness. Cyber adversaries never sleep and the geopolitical tensions across the world are...
Reflections on the Okta Breaches: We All Live in Glass Houses Now
Blog
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s...
Why GPTs are a Relationship Store, Not an App Store
Blog
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
Blog
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance.
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
Foresight Consulting in Cybersecurity
Blog
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Blog
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of...
1 2 3 4 5 6 7 Next