Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability...
Learn more
Blog
Blog
We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance
If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company,...
Learn more
Leadership Compass
Leadership Compass
Intelligent SIEM Platforms
This report is an overview of the market for modern, intelligent Security Information and Event Management (SIEM) platforms and provides you with a compass to help you to find the solution that...
Learn more
Webinar Recording
Webinar Recording
Cyber Resilience Through SOC Automation
Join experts from Kuppinger Cole Analysts and Palo Alto Networks as they discuss why automating as much as possible and providing information to enable analysts to make timely decisions should be...
Learn more
Are Cyber Insurance Policies Necessary?
Blog
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance...
How to Find the Best IT Solution for Your Business
Blog
How to Find the Best IT Solution for Your Business
Finding the right cybersecurity solution for your business can be challenging. Find out how to uncover the right tool for your organization. 
CSLS 2022 Is a Wrap
Blog
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Cyber Resilience
Blog
Cyber Resilience
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack,...
Preventing Supply Chain Attacks
Blog
Preventing Supply Chain Attacks
Supply chain attacks have become a major concern for every kind of organization. Which role does Governance, Risk, and Compliance (GRC) play in all this and what does the future hold for enterprises?
What We Can Learn from DeFi and Crypto Exchange Attacks
Blog
What We Can Learn from DeFi and Crypto Exchange Attacks
Attacks on DeFi platforms occur often enough to show that proper cyber hygiene is necessary no matter how cutting edge the technology is.
Do You Really Need a VPN?
Blog
Do You Really Need a VPN?
Nothing is as misunderstood as a VPN. Some providers claim that their VPN makes browsing safer and improves privacy. Is that really the case, or could it make things worse? Read now and find out!
Cyber Supply Chain Security
Blog
Cyber Supply Chain Security
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in...
The Importance of SME’s Cybersecurity
Blog
The Importance of SME’s Cybersecurity
Security controls are diverse and complex. Every organization faces dynamic and relentless attackers every day. Watch now and find out what insights Andrzej Kawalec provides that can make a CISO's...
Is It Possible to Recover After a Cyberattack?
Blog
Is It Possible to Recover After a Cyberattack?
Unfortunately, every organization is vulnerable to suffer a cyberattack. We have seen in the last years a considerable increase in cybercrime and the negative impact that it causes on businesses....
1 2 3 4 5 6 7 Next