Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
The 3 Essentials of a Cyber Leader
How can the Cybersecurity Leadership Summit help you become a great digital leader? Raj Hegde, Product Manager, tells us what the 3 core qualities of the digital leaders of the future are, and how...
Learn more
Executive View
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #19: Identity Vetting - Dealing With the Wave of Fraud During the Pandemic
Matthias Reinwarth and John Tolbert discuss the latest "innovations" fraudsters are using during the pandemic crisis and the methods to mitigate them.
Learn more
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
How Useful is Cybersecurity Awareness Training Really? - Cybersecurity Fact or Fiction Part 2
Video
How Useful is Cybersecurity Awareness Training Really? - Cybersecurity Fact or Fiction Part 2
In part two of "Cybersecurity Fact or Fiction," our esteemed analysts, Matthias Reinwarth, Alexei Balaganski, Marina Iantorno, and Paul Fisher, continue their thrilling quest to distinguish...
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
Analyst Chat
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
In this episode, Marina discusses the intricacies of synthetic data, AI-generated datasets that mimic real data without revealing personal information. Marina and Matthias explore its significant...
Are Boomers Most Vulnerable to Cyber Attacks? - Cybersecurity Fact or Fiction Part 1
Video
Are Boomers Most Vulnerable to Cyber Attacks? - Cybersecurity Fact or Fiction Part 1
To commemorate Cybersecurity Awareness Month 2023, Matthias Reinwarth, Alexei Balaganski, Marina Iantorno, and Paul Fisher came together to play "Cybersecurity Fact or Fiction". This captivating...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Blog
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of...
Cyberkriminalität profitiert von sicheren Häfen
Blog
Cyberkriminalität profitiert von sicheren Häfen
Cyberkriminelle nutzen Desinformationskampagnen, um Informationssicherheitssysteme auszuhöhlen. Unser Gespräch mit dem Chefredakteur des Tagesspiegel Background Cybersecurity beleuchtet, wie der...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Webinar Recording
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
Join security experts at KuppingerCole Analysts and CrowdStrike as they discuss why SOCs typically struggle to be more proactive, explore what is required to build a flexible, scalable and...
Making Cybersecurity ‘Lagom’
Blog
Making Cybersecurity ‘Lagom’
Join Swedbank’s Patrick Shirazi when he discusses the human role in cybersecurity and what cybersecurity experts can learn from the Swedish concept of Lagom.
Architecting Your SOC to Defend Against Today's Attack Vectors
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
Enhancing AI Cybersecurity: A Two-Fold Approach
Blog
Enhancing AI Cybersecurity: A Two-Fold Approach
Tune in to Sray Agarwal, Senior Director at Fractal AI discussing ethical frameworks, cybersecurity aspects, and data security of artificial intelligence models.
Previous
7 8 9 10 11 12 13 Next