Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are...
Learn more
Leadership Brief
Leadership Brief
EU NIS2 Directive
Every organization needs to take steps to ensure their cyber resilience and this updated directive provides a useful framework for this. This report provides a summary of the technical obligations...
Learn more
Event Recording
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Learn more
Do You Really Need a VPN?
Blog
Do You Really Need a VPN?
Nothing is as misunderstood as a VPN. Some providers claim that their VPN makes browsing safer and improves privacy. Is that really the case, or could it make things worse? Read now and find out!
Cyber Supply Chain Security
Blog
Cyber Supply Chain Security
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in...
The Importance of SME’s Cybersecurity
Blog
The Importance of SME’s Cybersecurity
Security controls are diverse and complex. Every organization faces dynamic and relentless attackers every day. Watch now and find out what insights Andrzej Kawalec provides that can make a CISO's...
Is It Possible to Recover After a Cyberattack?
Blog
Is It Possible to Recover After a Cyberattack?
Unfortunately, every organization is vulnerable to suffer a cyberattack. We have seen in the last years a considerable increase in cybercrime and the negative impact that it causes on businesses....
Cyber-Crisis Becomes an Opportunity for Insurers
Blog
Cyber-Crisis Becomes an Opportunity for Insurers
The pandemic changed our lives in many ways, some good and some bad. However, one impact has been that that cyber-attacks are more prevalent than ever before. This problem comes with opportunities....
Countering State-Sponsored Cyber Attacks
Blog
Countering State-Sponsored Cyber Attacks
Nordea CSO Marc Hofmann explains the significance of state actors in today's cyber threatscape and what organizations can do to protect themselves.
State-sponsored Cyber Attacks
Blog
State-sponsored Cyber Attacks
Leading organizations have long factored state-sponsored cyber-attacks into their risk-based cyber defense planning, but the need to do so has been highlighted in recent months due to an increase...
Cyber Hygiene: Common Problems & Best Practices
Blog
Cyber Hygiene: Common Problems & Best Practices
Adopting a cyber hygiene strategy is a lot like developing new habits to work more safely. Similar to personal habits, organizations also have a culture. Cyber hygiene routines must be a shared...
Raising User Awareness to Increase Cyber Resilience
Blog
Raising User Awareness to Increase Cyber Resilience
How can you mitigate risk in the age of socially engineered cyberattacks? Watch now and find out.
Ransomware Attacks on Critical Infrastructure
Blog
Ransomware Attacks on Critical Infrastructure
Ransomware is a very easy and successful way of making money illicitly, so it is a proven business model unlikely to lose popularity with cyber criminals any time soon. Cybercriminals are also...
Who is Afraid of Security Automation?
Blog
Who is Afraid of Security Automation?
Understanding security automation is becoming increasingly important as security experts become rarer. Read now!
The Importance of Standards in the IT Security Industry
Blog
The Importance of Standards in the IT Security Industry
Tune in to learn more about the importance of standards in cybersecurity
Previous
1 2 3 4 5 6 7 Next