Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Prepare, Prevent and Protect
Recent SolarWinds, Kaseya, and Log4j compromises by malicious actors have demonstrated the need to focus on software supply chain security. Organizations can not afford to ignore this increasing...
Learn more
Executive View
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
Learn more
Event Recording
Event Recording
Panel | It all starts with the Endpoint
The panel will discuss the role of endpoint security in today’s world of WfA (Work from Anywhere), BYOD (Bring Your Own Device), and people commonly using multiple devices, as well as...
Learn more
The Rise of AI Is Revolutionizing Cyber-Attacks
Blog
The Rise of AI Is Revolutionizing Cyber-Attacks
Artificial Intelligence (AI) has been a revolutionary force in several fields, transforming industries and increasing efficiency. Its impact, however, is not restricted to good applications. AI has...
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Blog
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Join KuppingerCole CEO Berthold Kerl to find out what cyberevolution is all about and why you should join.
AI and Cybersecurity: A New Hope for Cyber Defenders?
Blog
AI and Cybersecurity: A New Hope for Cyber Defenders?
Statistics from around the world clearly show that data breaches, ransomware attacks, and other cyberthreats are on the rise. Everyone has high hopes for Artificial Intelligence (AI) technologies...
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Blog
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Artificial intelligence has radically transformed the field of cybersecurity. Although it is considered a game changer, the adoption of AI presents significant ethical challenges, bias, and the...
The IAM Market: What is driving growth in 2023?
Blog
The IAM Market: What is driving growth in 2023?
Identity and Access Management (IAM) is an essential component of IT security today, enabling organizations to control access to their systems and data by managing user identities, access...
Microsoft Security Copilot: Value-adding Generative AI
Blog
Microsoft Security Copilot: Value-adding Generative AI
Microsoft announced the Microsoft Security Copilot, a new security offering based on a combination of the GPT-4 language model, the well-known technology provided by OpenAI that also powers ChatGPT...
Are Cyber Insurance Policies Necessary?
Blog
Are Cyber Insurance Policies Necessary?
Cyber insurance offers protection against financial damage resulting from catastrophes involving computer networks, such as data breaches, network failures, and cyber-attacks. Cyber insurance...
How to Find the Best IT Solution for Your Business
Blog
How to Find the Best IT Solution for Your Business
Finding the right cybersecurity solution for your business can be challenging. Find out how to uncover the right tool for your organization. 
CSLS 2022 Is a Wrap
Blog
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Cyber Resilience
Blog
Cyber Resilience
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack,...
Preventing Supply Chain Attacks
Blog
Preventing Supply Chain Attacks
Supply chain attacks have become a major concern for every kind of organization. Which role does Governance, Risk, and Compliance (GRC) play in all this and what does the future hold for enterprises?
What We Can Learn from DeFi and Crypto Exchange Attacks
Blog
What We Can Learn from DeFi and Crypto Exchange Attacks
Attacks on DeFi platforms occur often enough to show that proper cyber hygiene is necessary no matter how cutting edge the technology is.
Previous
1 2 3 4 5 6 7 Next