Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and...
Learn more
Executive View
Executive View
Micro Focus ArcSight
ArcSight is a modern SIEM solution that provides an advanced security analytics platform for storing, analyzing, and visualizing information from multiple sources and converting it into actionable...
Learn more
Webinar Recording
Webinar Recording
Sicherung Ihrer digitalen Grenze: Navigieren durch die sich ständig weiterentwickelnde Bedrohungslandschaft
Charlene Spasic, Advisor bei KuppingerCole Analysts, wird einen Überblick über Attack Surface Management-Lösungen geben, was sie leisten und warum Unternehmen diese Art von...
Learn more
Zero Trust Paradigm for the Future of Security
Blog
Zero Trust Paradigm for the Future of Security
Martin Kuppinger explains the meaning behind the popular buzzword.
AI Landscape: More Complicated Than You Might Have Thought
Blog
AI Landscape: More Complicated Than You Might Have Thought
I’m by no means an AI expert. Sure, I’ve been following the topic with much curiosity ever since reading an article about thinking machines back in 1990. Also, having a degree in...
Was die IT in der Krise NICHT machen sollte
Blog
Was die IT in der Krise NICHT machen sollte
Martin Kuppinger spricht über die Dinge, die IT-Teams in der Krise in jedem Fall vermeiden sollten.
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Blog
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Today, Lead Analyst John Tolbert gives his five work from home cybersecurity recommendations for enterprises.
Die fünf wichtigsten Cybersecurity Maßnahmen für Unternehmen in Zeiten des Home Office
Blog
Die fünf wichtigsten Cybersecurity Maßnahmen für Unternehmen in Zeiten des Home Office
Martin Kuppinger spricht in seinem Video über die wichtigsten Cybersecurity-Maßnahmen für Unternehmen während der Corona-Pandemie.
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
Blog
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
As the business world moves to rapidly enable work-from-home (WFH), enterprise IT teams need to shift resources and priorities to ensure that remote workers are protected. Already we see malicious...
Malicious Actors Exploiting Coronavirus Fears
Blog
Malicious Actors Exploiting Coronavirus Fears
Security researchers are discovering a number of malicious attacks designed to exploit public fears around COVID-19, more commonly just called coronavirus. The attacks to date take two major...
Preparation Is Key: Where Prevention Ends, and Business Continuity and Incident Response Management Begins
Blog
Preparation Is Key: Where Prevention Ends, and Business Continuity and Incident Response Management Begins
Ensuring the availability of processes and services in the event of an incident or a cyber attack is a fundamental part of a company’s cybersecurity approach. Commonly used phrases when it...
Top 5 Recommendations for Reducing Cyber Risks in 2020
Blog
Top 5 Recommendations for Reducing Cyber Risks in 2020
The turn of the year has been an occasion for many cybersecurity news outlets to talk about trends and challenges in cybersecurity. Despite the importance of knowing what the trends and challenges...
Why C-SCRM Is Becoming so Essential for Your Digital Business
Blog
Why C-SCRM Is Becoming so Essential for Your Digital Business
The current discussion around Huawei and whether or not it should be endorsed as a supplier for 5G mobile network hard- and software has reminded us on how dependent we are on the integrity and...
Three Critical Elements Required to Close the Cybersecurity Skills Gap
Blog
Three Critical Elements Required to Close the Cybersecurity Skills Gap
The status on cybersecurity is fairly clear: 82% of employers report that their cybersecurity skills are not enough to handle the rising number of cyber incidents ( Center for Strategic &...
The C5:2020 - A Valuable Resource in Securing the Provider-Customer Relationship for Cloud Services
Blog
The C5:2020 - A Valuable Resource in Securing the Provider-Customer Relationship for Cloud Services
KuppingerCole has accompanied the unprecedented rise of the cloud as a new infrastructure and alternative platform for a multitude of previously unimaginable services – and done this...
Previous
7 8 9 10 11 12 13 Next