Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare...
Learn more
Executive View
Executive View
CYFIRMA DeCYFIR
Reactive security measures respond to cyberattacks that have already happened. While cybersecurity spending is increasing, cyberattacks are also becoming more frequent. To mitigate risks and...
Learn more
Event Recording
Event Recording
How M&A is reshaping the cybersecurity landscape
The threat environment remains intense. Changing IT architectures present meaningful and operational risks for enterprises. Today’s cybersecurity market is highly fragmented. A number of...
Learn more
Public-Private Cooperation in Cyberspace
Blog
Public-Private Cooperation in Cyberspace
Managing business in today's geopolitical context In the face of a geopolitical crisis, concerns are growing about the threat of cyber-attacks to global supply chains and private organizations,...
Software Supply Chain Risks: How to re-assess when there is a ban?
Blog
Software Supply Chain Risks: How to re-assess when there is a ban?
With supply chains under attack and the recent Kaspersky ban, CISOs need to act. But how?
Prepare, Prevent and Protect
Blog
Prepare, Prevent and Protect
Recent SolarWinds, Kaseya, and Log4j compromises by malicious actors have demonstrated the need to focus on software supply chain security. Organizations can not afford to ignore this increasing...
AI Ethics Are Urgent. Here Is Why
Blog
AI Ethics Are Urgent. Here Is Why
Where we already benefit from AI Efficiency, personalization, and transforming numerous parameters into an actionable insight are some of the benefits we have from AI. Artificial...
Hyperautomation Changing Business
Blog
Hyperautomation Changing Business
Hyperautomation has the potential to disrupt and accelerate business all over the world. It is necessary to be prepared. There is automation, and there is hyperautomation. Buckle up! Before...
Autonomous Machines Transforming Business
Blog
Autonomous Machines Transforming Business
Comprehending the Current and Future Transformation of Business by Autonomous Machines Self-driving cars! Not so fast, autonomous devices include much more than just vehicles. Autonomous...
Intelligent SIEM platforms
Blog
Intelligent SIEM platforms
In the face of today’s cyber threats, no organization can claim it does not have a need for a centralized, coordinated view of their security posture and the ability to respond to threats...
Adding Bread to the Sandwich: Beyond MITRE D3FEND
Blog
Adding Bread to the Sandwich: Beyond MITRE D3FEND
Commissioned by HCL Software Over the past years, various frameworks and models for defending against cyber-attacks have been published. A popular one is the NIST CSF (Cybersecurity...
Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify
Blog
Google Cloud Advances Security Capabilities by Acquiring SOAR Vendor Siemplify
Yesterday, Google has announced that it has acquired Siemplify , a well-known provider of security orchestration, automation and response (SOAR) solutions, for an undisclosed amount. The stated...
Log4j – How Well Did You Perform?
Blog
Log4j – How Well Did You Perform?
Over the past few weeks since this vulnerability was made public much has been written by many on what your organization should do about it.  This is not the end of the story; Apache has...
AI in Cybersecurity
Blog
AI in Cybersecurity
Although we are still a long way from machines being able to react to situations in an intelligent, human way, Artificial Intelligence (AI) technologies have finally matured to the point where...
Human Factor in Cybersecurity
Blog
Human Factor in Cybersecurity
Data leakage is mainly due to industrial espionage, hacktivism, disgruntled employees, problems in processes, and human error. Considering that most industrial espionage and other cyber attacks...
Previous
3 4 5 6 7 8 9 Next