Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In the high-stakes world of financial institutions, safeguarding sensitive data is paramount. The enemy, however, may lurk within. Join us for an eye-opening webinar as we delve deep into the world...
Learn more
Blog
Blog
Why Enterprises Are Choosing SOAR for SOCs
Security Orchestration, Automation, and Response (SOAR) platforms are attracting a lot of attention from many organizations, from enterprises to government agencies and even those on the upper end...
Learn more
Market Compass
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service...
Learn more
Event Recording
Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of...
Learn more
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
Blog
Challenging the Easy Path: Why NIS2 Demands a New Compliance Mindset
The enforcement of NIS2 is marked by firm oversight and significant sanctioning power. Supervisory bodies are designated at the national level to monitor and enforce compliance.
Are You Prepared for the True AD Disaster?
Webinar Recording
Are You Prepared for the True AD Disaster?
In this webinar, we will look at Disaster Recovery planned right and done right – preparation is key to success The central role of directory services for the entire IT Events...
cyberevolution Wrap-Up
Video
cyberevolution Wrap-Up
The Shield of Innovation: How Technology Empowers Fraud Prevention
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications,...
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
Event Recording
Automation, Insight, AI: The Strategic Importance of a Data Fabric for Security
The Elastic InfoSec team is responsible for securing Elastic’s globally distributed, remote-first workforce, and the planet scale, multi-cloud, Elastic Cloud platform. Taking data driven...
Understanding the complexity and ambiguity of AI Ethics
Event Recording
Understanding the complexity and ambiguity of AI Ethics
Panel: AI Governance & Regulation
Event Recording
Panel: AI Governance & Regulation
Artificial Intelligence is transforming how we live, work, and interact, bringing groundbreaking opportunities and notable challenges. As the influence of AI continues to grow, the pressing issues...
RAI 2.0 in the era of Gen AI - Need for Regulating AI
Event Recording
RAI 2.0 in the era of Gen AI - Need for Regulating AI
The Digital Identity Wallet - A user perspective
Event Recording
The Digital Identity Wallet - A user perspective
The promise of the DIW (Digital Identity Wallet), which is inspired by SSI (Self-Sovereign Identity), is to give the user more control of which data they are sharing with whom. But do the users...
The SSI movement: developments and status quo
Event Recording
The SSI movement: developments and status quo
At first, some insights into the background, purpose and history of the e-IDAS regulation are provided and the difference between the previous and the currently proposed e-IDAS version are...
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his...
Closing Keynote and Award Ceremony Capture The Flag
Event Recording
Closing Keynote and Award Ceremony Capture The Flag
1 2 3 4 5 6 7 Next