Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Tech vs. Law: A Dialectical Approach to Balancing Innovation and Regulation
The complex relationship between law and technology presents a world of possibilities. While some may view law as a constraint on innovation, it serves a crucial role in safeguarding public welfare...
Learn more
Executive View
Executive View
Deduce Customer Alerts and Identity Insights
Fraud is a pervasive and growing problem in most online businesses today. Fraud is eroding profits and decreasing consumer confidence across retail, finance, travel, healthcare, and many...
Learn more
Event Recording
Event Recording
Enabling the Power of Digitalization with Identity-Based Access Privileges
As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has...
Learn more
Securing the SaaS Revolution: Protecting Your Data in the Cloud
Event Recording
Securing the SaaS Revolution: Protecting Your Data in the Cloud
The best CISO’s are never surprised! But now that SaaS apps like Salesforce, ServiceNow, or M365 have become mission-critical for organisations and process sensitive data, it's getting...
Protect APIs Everywhere with Modern Solutions
Event Recording
Protect APIs Everywhere with Modern Solutions
Attackers follow the money. In a digital economy, this means targeting web apps and APIs to exploit vulnerabilities and abuse business logic, leading to data breach, account takeover, and fraud...
Beware of Easy Paths: The Journey Towards NIS2 Compliance
Event Recording
Beware of Easy Paths: The Journey Towards NIS2 Compliance
Matthias offers a critical analysis of the EU's NIS2 Directive's intricate demands, drawing attention to the limitations of one-size-fits-all solutions. He advocates for customized compliance...
Enabling the Power of Digitalization with Identity-Based Access Privileges
Event Recording
Enabling the Power of Digitalization with Identity-Based Access Privileges
As organizations seamlessly navigate between on-premises, cloud-based, and offline resources while harnessing the power of AI, the need to verify and manage user identities with precision has...
Panel | Autonomous Yet Accountable: Do We Need Identities for AI?
Event Recording
Panel | Autonomous Yet Accountable: Do We Need Identities for AI?
This session aims to explore the practicalities and paradigms of integrating AI identities into current and future digital infrastructures. Topics will include the regulatory and governance...
Operational concepts with the WALLIX tiering model
Event Recording
Operational concepts with the WALLIX tiering model
Lack of control and controllability is increasingly a problem in many internal IT departments today. The complexity of the solutions used has steadily increased. It is therefore all the more...
DORA: What are the Main Challenges Facing the Financial Industry?
Event Recording
DORA: What are the Main Challenges Facing the Financial Industry?
The Digital Operational Resilience Act (DORA), which entered into force on 16 January 2023 and will apply from 17 January 2025, aims to enhance the digital operational resilience of entities...
Cyber and Law – Do's and Don’ts in the Cyber Crisis from a Legal Perspective
Event Recording
Cyber and Law – Do's and Don’ts in the Cyber Crisis from a Legal Perspective
Hacked and what legally to do now? What are the most important steps and measures that companies should take to avert or minimise liability and reputational damage? Fabian Bauer will give exciting...
RECAP Cyberevolution Day II
Event Recording
RECAP Cyberevolution Day II
Navigating the Cyber Regulatory Landscape: Quo vadis Cyber Regulations
Event Recording
Navigating the Cyber Regulatory Landscape: Quo vadis Cyber Regulations
What's happening with the growth and increase in Cyber Regulations in Europe? Why are authorities pushing more and more regulations that focus on Cyber Security and Risk Management? Does it...
Hacked! How to handle a Ransomware Attack
Event Recording
Hacked! How to handle a Ransomware Attack
Picture this: your defenses are breached, and chaos ensues. What's your next move? In this engaging keynote address, led by an experienced CISO, we explore those crucial first hours in the wake of...
Cloud Security in a highly regulated environment
Event Recording
Cloud Security in a highly regulated environment
Previous
3 4 5 6 7 8 9 Next