Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Maximizing Cyber Security Investments in Economically Turbulent Times
Mitigating digital risk and protecting your organizations from cyber attacks and data breaches is all the more challenging with shrinking IT budgets in a volatile economic environment. The ability...
Learn more
Blog
Blog
Organizations Need a Dream IAM
Did your organization define a ‘desired state’ for identity and access management? You need a clear goal because you need to know where you're headed to align your resources, people, and technology...
Learn more
Leadership Brief
Leadership Brief
EU NIS2 Directive
Every organization needs to take steps to ensure their cyber resilience and this updated directive provides a useful framework for this. This report provides a summary of the technical obligations...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #7: Fraud Reduction Intelligence Platforms
Matthias Reinwarth and John Tolbert explain the meaning behind the term and talk about various factors that help identify fraudulent transactions in different industries.
Learn more
Effects of Malware Hunting in Cloud Environments
Event Recording
Effects of Malware Hunting in Cloud Environments
NIS2 Directive – What It Is and Why You Need to Prepare
Event Recording
NIS2 Directive – What It Is and Why You Need to Prepare
Managing the Cyber Security Technical Debt: How did we get there? And what to do about it?
Event Recording
Managing the Cyber Security Technical Debt: How did we get there? And what to do about it?
This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and...
Security Automation Strategies to Succeed or Fail: You Choose
Event Recording
Security Automation Strategies to Succeed or Fail: You Choose
This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral...
Sustainable Vulnerability Management: Case Study by KuppingerCole
Event Recording
Sustainable Vulnerability Management: Case Study by KuppingerCole
For any large company, regulated or not, it is essential to have a mechanism or process for detecting vulnerabilities. For this purpose, various scanners exist that can automatically scan the...
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
 
Strategic Approaches to Secure Industrial Control System Environments
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
 
Protecting Infrastructure in an Exposed Environment
Event Recording
Protecting Infrastructure in an Exposed Environment
On the Charge: Securing the Energy Sector
Event Recording
On the Charge: Securing the Energy Sector
The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical...
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics.  It is unlikely to have a greenfield...
Previous
2 3 4 5 6 7 8 Next