Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability...
Learn more
Blog
Blog
Die fünf wichtigsten Cybersecurity Maßnahmen für Unternehmen in Zeiten des Home Office
Martin Kuppinger spricht in seinem Video über die wichtigsten Cybersecurity-Maßnahmen für Unternehmen während der Corona-Pandemie.
Learn more
Executive View
Executive View
BehavioSec
BehavioSec is a fraud risk analysis and authentication solution provider whose products leverage advanced behavioral biometrics and Artificial Intelligence / Machine Learning detection technology...
Learn more
Event Recording
Event Recording
The Art of Becoming a Multifaceted CISO
The challenges to information security in companies are increasing every year. The focus is on serious attacks against small and large companies and the urgent need to protect their own...
Learn more
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Analyst Chat
Analyst Chat #154: 2022 Wrapped Up - Major Trends in IAM and Cybersecurity
Another year gone already! It's time to take a look back at 2022. Martin Kuppinger and Matthias talk about what happened in the past year and identify top trends in IAM and Cybersecurity....
CSLS 2022 Is a Wrap
Blog
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Recap Cybersecurity Leadership Summit 2022
Video
Recap Cybersecurity Leadership Summit 2022
Key Findings on Malign Information, Misinformation, and Cyberattacks
Interview
Key Findings on Malign Information, Misinformation, and Cyberattacks
Ksenia Iliuk, Head of Research at Detector Media, Ukraine tells us about some key findings of their research in the media landscape of Ukraine. Find out what she has to say about Telegram and what...
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving...
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin...
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this...
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
Event Recording
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat....
Awareness?! How to Make It Work in a Low-Tech Environment
Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called  cyber hygiene.  Enterprises today deal wih a sheer volume users, data and...
Previous
1 2 3 4 5 6 7 Next