Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Preventing Supply Chain Attacks
Supply chain attacks have become a major concern for every kind of organization. Which role does Governance, Risk, and Compliance (GRC) play in all this and what does the future hold for enterprises?
Learn more
Whitepaper
Whitepaper
Die Automatisierung des SOC
SOAR, Security Orchestration, Automation and Response, ist das jüngste in einer Reihe von mit Security verbundenen Modewörtern, die sich auf dem Markt verbreiten. Obwohl SOAR erst in den letzten...
Learn more
Webinar Recording
Webinar Recording
Combatting Fraud Proactively With Behavioral Biometrics
Digital businesses are facing an increasing onslaught of fraud enabled by malware, social engineering, and other cyber criminal activities. Strong authentication is essential, especially in the...
Learn more
HP Endpoint Security - Time for a Different Endpoint Security
Event Recording
HP Endpoint Security - Time for a Different Endpoint Security
IT Security – In a General Perspective: Security Investment vs. Success New Goals, Rediscovering Old Objectives Closing the Gap with HP Wolf Security
Advancing at the speed of AI
Event Recording
Advancing at the speed of AI
How do key human behaviours influence on how we look at AI and turn technology use in long term strategic advantage. Reflecting on learnings gained when operationalizing AI in a large...
Beyond the Now: Examining Emerging Trends in the Cybersecurity Landscape
Event Recording
Beyond the Now: Examining Emerging Trends in the Cybersecurity Landscape
The results of a comprehensive 2023 study by KuppingerCole will be presented, providing invaluable foresight into cybersecurity trends and threats anticipated for 2024. Based on in-depth research,...
Building Security - SQUARED! Securing critical transportation infrastructure in Germany
Event Recording
Building Security - SQUARED! Securing critical transportation infrastructure in Germany
The German railroad system is part of the national Critical Infrastructure, and hence all major train stations are fall under the KRITIS regulation. Recently, OT-(in)Security has drawn the...
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Event Recording
Asset Management for Cybersecurity: A Modern Solution for An Age-Old Challenge
Asset management used to be easy, but not anymore. Where and how we work, the types and amount of devices we use, and the ways and places we store information have all changed. What’s...
The Human Factor: Why people are the main key to cybersecurity?
Event Recording
The Human Factor: Why people are the main key to cybersecurity?
When it comes to cybersecurity, many people focus on red/blue teams and technical measures such as servers, firewalls, encryption, and intrusion prevention systems. However, one crucial factor...
Anchors of Trust - Lessons learned from a Ransomware attack
Event Recording
Anchors of Trust - Lessons learned from a Ransomware attack
The word no company wants to hear became an unfortunate reality for one of the world’s largest independent development partners to the automotive and aviation industries — ransomware....
Smart threat defense thanks to AI-powered threat intelligence and security awareness training
Event Recording
Smart threat defense thanks to AI-powered threat intelligence and security awareness training
Learn why the use of artificial intelligence (AI) through threat actors makes a "new security awareness" on the user side essential.   Key areas of focus: - How can AI-based...
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
Event Recording
No Experience Needed - Addressing the Global Cybersecurity Workforce Gap by Expanding Career Pathways
The 2023 Cybersecurity Workforce Study identifies a daunting 4 million-person workforce gap. This shortfall in qualified candidates hampers industry growth. To tackle this challenge, the industry...
Closing Keynote and Award Ceremony Capture The Flag
Event Recording
Closing Keynote and Award Ceremony Capture The Flag
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
Event Recording
Beyond Centralization: Enhancing Cybersecurity with Decentralized ID
In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the concepts behind Decentralized ID and its current state. Based on that introduction, he will share his...
The SSI movement: developments and status quo
Event Recording
The SSI movement: developments and status quo
At first, some insights into the background, purpose and history of the e-IDAS regulation are provided and the difference between the previous and the currently proposed e-IDAS version are...
Previous
1 2 3 4 5 6 7 Next