Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Innovation Never Rests - a New SOC Blueprint for Tomorrow's Threats
The traditional approach to building a security operations center (SOC) is no longer valid or able to keep up with the rate of change in business IT environments and in the cyber threat landscape....
Learn more
Blog
Blog
Elements of a Disaster Operations Plan
If anyone in any organization was in any doubt about the importance of having a Disaster Operations Plan, that has surely changed since the outbreak of the Covid-19 pandemic. Some organizations...
Learn more
Executive View
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Learn more
Video
Video
Die fünf wichtigsten Cybersecurity Maßnahmen für Unternehmen in Zeiten des Home Office
Martin Kuppinger spricht über die wichtigsten Cybersecurity-Maßnahmen für Unternehmen während der Corona-Pandemie.  
Learn more
Creating the Identity Driven Cybersecurity Mesh Architecture
Event Recording
Creating the Identity Driven Cybersecurity Mesh Architecture
In overcoming the ancient concept of firewalled enterprise perimeters, securing identities has become the core element of a future driven Cybersecurity Mesh Architecture, with a composable...
Reducing Complexity – Introducing a Practical Model for Security Classifications
Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Practical Cyber Security Architecture: Reducing complexity – Introducing a practical model for security classifications. Building and running cyber security in both worlds modern cloud...
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Event Recording
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Attackers have also realigned their efforts, focusing on staying...
Orchestrating Zero Trust -
Event Recording
Orchestrating Zero Trust - "Detect, Decide, Direct"
The Zero Trust paradigm, the approach of eliminating inherent trust in an IT architecture and always verifying, has been discussed for over a decade. It is well known that Zero Trust is a team...
From Identity Theft to Identity Threat to Identity Security
Event Recording
From Identity Theft to Identity Threat to Identity Security
Identity has been always an ambiguous term. Identities exist in a sociocultural and organizational context and in technical ones. We have Digital Identities and eIDs and not only do individuals...
The eID Threat Landscape – Stay Ahead of the Fraudsters
Event Recording
The eID Threat Landscape – Stay Ahead of the Fraudsters
Cash grab-robberies are out, online fraud is in. When multinational hacker groups target senior and vulnerable citizens as a business model. Learn how BankID is fighting fraud and helps you...
The AML-Compliant ID-Wallet
Event Recording
The AML-Compliant ID-Wallet
AML-compliant customer identification in the finance and banking sector (KYC) in Germany is subject to the requirements of BaFin (the regulatory authority) and the Money Laundering Act. This...
The Path to Passwordless is Paved with Orchestration
Event Recording
The Path to Passwordless is Paved with Orchestration
End-users have become accustomed to shopping, dining, traveling, learning, and caring for their health in an ever-more-digital fashion. Unfortunately, bad actors have put personal data at greater...
Security Offered as Components Empowering Enterprises to Gain Control
Event Recording
Security Offered as Components Empowering Enterprises to Gain Control
You often think service providers should build identity and API security infrastructure by themselves to have full control and flexibility so that it can fit into their business and technology...
Automated Serverless Security Testing: Delivering Secure Apps Continuously
Event Recording
Automated Serverless Security Testing: Delivering Secure Apps Continuously
Serverless technology eliminates the need for development teams to provision servers, and it also results in some security threats being passed to the cloud provider. This frees up developers to...
Previous
2 3 4 5 6 7 8 Next