Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Generative AI in Cybersecurity – It's a Matter of Trust
We cannot deny the fact that Generative AI is a game-changer in almost every industry, including cybersecurity. And yet it is critical for everyone to understand that GenAI does not do magic. It is...
Learn more
Advisory Note
Advisory Note
Cybersecurity Resilience with Generative AI
Cyberattacks have intensified in recent years. The evolving threat landscape is exemplified by the persistent threat of cyberattacks, driven by cybercriminals' exploration of new tools and...
Learn more
Event Recording
Event Recording
The Shield of Innovation: How Technology Empowers Fraud Prevention
Fraud is a major cost to businesses worldwide. Banking, finance, payment services, and retail are some of the most frequent targets of fraudsters. However, insurance, gaming, telecommunications,...
Learn more
NIS2 Directive: Who, What, and How?
Blog
NIS2 Directive: Who, What, and How?
In the wake of increased cyber-attacks on national critical infrastructure, authorities around the world are imposing stricter requirements on organizations that their populations rely on for a...
Human Factor in Cybersecurity: The Weakest Link?
Blog
Human Factor in Cybersecurity: The Weakest Link?
The Human Factor Cybercriminals often exploit our human vulnerabilities and psychological elements to steal credentials and gain unauthorized access. Since phishing and social engineering...
The 3 Essentials of a Cyber Leader
Blog
The 3 Essentials of a Cyber Leader
How can the Cybersecurity Leadership Summit help you become a great digital leader? Raj Hegde, Product Manager, tells us what the 3 core qualities of the digital leaders of the future are, and how...
Speaking in Cybersecurity: My Recollection!
Blog
Speaking in Cybersecurity: My Recollection!
During my studies and the subsequent first years of my career, I was already always someone who liked to share knowledge with others and present interesting topics. This is not the only reason why...
Securing Industrial Control Systems (ICS)
Blog
Securing Industrial Control Systems (ICS)
Cybersecurity has become essential for every modern business, but has historically focused on securing information technology (IT) used by the administrative side of the business, rather than...
Deepfakes: A Case for or Against Remote Identity Verification?
Blog
Deepfakes: A Case for or Against Remote Identity Verification?
Recently deepfakes made a splash in the headlines: Vitali Klitschko, the mayor of Kiev held one-on-one virtual interviews with several European leaders – or so they thought. In the days...
Security Automation
Blog
Security Automation
As the intensity and sophistication of cyber-attacks, and the complexity of business IT environments continue to increase amid an ongoing worldwide shortage of skilled cybersecurity professionals...
Staying Ahead in the Innovation Race
Blog
Staying Ahead in the Innovation Race
Composable Enterprise, Privacy-by-Design, Zero Trust... the direction your organization chooses to innovate in will have an influence on its investment decisions. Find inspiration, to stay ahead in...
Arrival of the Digital Services Act (DSA)
Blog
Arrival of the Digital Services Act (DSA)
The Digital Services Act (DSA), along with the Digital Market Act (DMA) are initiatives from the European Union Commission, proposed in December 2020 and agreed upon in April 2022 . The main goal...
Organizations Need a Dream IAM
Blog
Organizations Need a Dream IAM
Did your organization define a ‘desired state’ for identity and access management? You need a clear goal because you need to know where you're headed to align your resources, people, and technology...
Web 3.0 Creates a World Without Perimeters
Blog
Web 3.0 Creates a World Without Perimeters
The visions of Web3 will be mainstream one day but how we implement security and trust, is still up for debate. We are on the threshold of further evolution and must set the right course. But how?...
The European Identity & Cloud Conference Celebrates Its 15th Edition – Time for Looking Back
Blog
The European Identity & Cloud Conference Celebrates Its 15th Edition – Time for Looking Back
EIC veteran Martin Kuppinger takes us on a journey through the history of the most important IAM conference.
Previous
2 3 4 5 6 7 8 Next