Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Proactive Cyber Defense with Intelligent SIEM Platforms
Security information and event management (SIEM) solutions have dominated the enterprise security market for nearly two decades, but due to high operating costs, a shortage of skilled security...
Learn more
Blog
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
Learn more
Leadership Compass
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Learn more
Event Recording
Event Recording
Panel | Arresting Disaster: Driving Incident Response in Cyber-Regulated Europe in an Age of AI Threats
In today’s volatile cyber landscape, threats are increasingly sophisticated ( e.g. AI-powered ransomware and data exfiltration techniques ), and the regulatory environment is ever-changing....
Learn more
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Webinar Recording
Securing Your Digital Frontier: Navigating the Ever-Evolving Threat Landscape
Join security experts from KuppingerCole Analysts and Palo Alto Networks for an insightful and engaging webinar as they delve into the dynamic world of attack surface and threat management. They...
NIS2: What Everyone Needs to Consider
Video
NIS2: What Everyone Needs to Consider
The upcoming EU regulation, NIS2, moves closer and organizations will need to act in order to close gaps. Anders Askåsen from Okta and Martin Kuppinger discuss the impact on critical...
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #198: 2023 Wrapped Up - Major Trends in IAM and Cybersecurity
Join Matthias with Martin Kuppinger and Mike Neuenschwander in this special year-end episode. They reflect on the significant cybersecurity challenges of 2023. The conversation delves into...
Tata Communications MDR
Executive View
Tata Communications MDR
This KuppingerCole Executive View report looks at the managed detection and response (MDR) market and at how solutions address key challenges, with a review of the MDR service and related...
Cyber Security Evolve or Die
Blog
Cyber Security Evolve or Die
Cyber security is never done – you need to constantly work to improve your organization’s cyber security readiness. Cyber adversaries never sleep and the geopolitical tensions across the world are...
Maturity Level Matrix for Cyber Security
Advisory Note
Maturity Level Matrix for Cyber Security
KuppingerCole Maturity Level Matrices cover the major market segments within cyber security. This matrix aligns with the processes essential to good cyber hygiene as well as the NIST cybersecurity...
Reflections on the Okta Breaches: We All Live in Glass Houses Now
Blog
Reflections on the Okta Breaches: We All Live in Glass Houses Now
When the closing bell rang at the NASDAQ on November 29, 2023, Okta shares had been devalued by nearly 7% and received six downgrades from previous estimates, despite the company’s...
Analyst Chat #197: Inside cyberevolution - A Look Back at the Cybersecurity Conference
Analyst Chat
Analyst Chat #197: Inside cyberevolution - A Look Back at the Cybersecurity Conference
Join Matthias in this special edition of the KuppingerCole Analyst Chat as he takes a look back at the inaugural cyberevolution cybersecurity conference in Frankfurt. The episode features...
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Webinar Recording
Mastering Global IAM for Cybersecurity Excellence: From Zero Trust Principles to Identity Threat Detection & Response (ITDR)
Join this webinar to learn more about Complex Digital Transformations: As organizations transition to digital platforms and embrace cloud technologies, the webinar will provide insights into...
Navigating the Future of API Security: Trends, Challenges, and Innovations
Webinar Recording
Navigating the Future of API Security: Trends, Challenges, and Innovations
Join KuppingerCole’s Lead Analyst Alexei Balaganski talking about the need for robust security strategies, the increasing complexity of API ecosystems, and the importance of holistic...
Why GPTs are a Relationship Store, Not an App Store
Blog
Why GPTs are a Relationship Store, Not an App Store
For anyone paying attention to the OpenAI DevDay announcements a few weeks ago, Gizmodo’s recent article “Be Careful What You Tell OpenAI’s GPTs” shouldn’t come as news.
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
Webinar Recording
The Anatomy of Insider Threats: Understanding the Risks in Financial Institutions
In this webinar, you will:  Gain an understanding of insider threats and their implications for financial institutions.  Win best practices for creating a robust insider threat...
Previous
1 2 3 4 5 6 7 Next