Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
Inside cyberevolution: What to Expect at KuppingerCole's New Conference
Join KuppingerCole CEO Berthold Kerl to find out what cyberevolution is all about and why you should join.
Learn more
Executive View
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Learn more
Event Recording
Event Recording
Only Those Who Know the Dangers Can Protect Themselves
How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers...
Learn more
Cloud Security in a highly regulated environment
Event Recording
Cloud Security in a highly regulated environment
The Geopolitics of Cyberspace: Unraveling the Complexities of Cybersecurity
Event Recording
The Geopolitics of Cyberspace: Unraveling the Complexities of Cybersecurity
The past weeks again have demonstrated that cybersecurity and geopolitics are inseparable. Cyber attacks have become a common element in geopolitical crisis as an additional vector for concrete...
How M&A is reshaping the cybersecurity landscape
Event Recording
How M&A is reshaping the cybersecurity landscape
The threat environment remains intense. Changing IT architectures present meaningful and operational risks for enterprises. Today’s cybersecurity market is highly fragmented. A number of...
Upcoming changes in IT-Security from an Airline perspective
Event Recording
Upcoming changes in IT-Security from an Airline perspective
Time is moving fast in the IT-Security industry. The rise of AI brings new attacks for example as new and better redacted phishing emails. What are the risks and chances for Security...
Securing the Digital Frontier: Navigating EU Cybersecurity Regulation, NIS, and DORA
Event Recording
Securing the Digital Frontier: Navigating EU Cybersecurity Regulation, NIS, and DORA
In today's interconnected European digital ecosystem, the importance of robust cybersecurity measures is more pronounced than ever. The Network and Information Security Directive and the Digital...
Risk assessment the attacker way! How secured are your assets in reality?
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Building a successful vulnerability management service concept
Event Recording
Building a successful vulnerability management service concept
Vulnerability Management is more then ever an important building block when it comes to early detection of issues to allow a proactive counter measure. This is only possible if various...
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
Event Recording
Navigating the Complex Landscape: Challenges in Applying AI for Government Security
As governments around the world increasingly turn to artificial intelligence (AI) to enhance their security, a myriad of complex challenges emerge. This presentation delves into the multifaceted...
Hacked! 72 Hours of a CISO's Nightmare
Event Recording
Hacked! 72 Hours of a CISO's Nightmare
When the worst happens, and your defenses are breached, how do you respond? This engaging workshop, led by an experienced CISO, takes you through the crucial first hours of a cyber-attack. Using...
Cyber Defense Matrix
Event Recording
Cyber Defense Matrix
The cybersecurity landscape is complex and can be confusing even to experts. The Cyber Defense Matrix is a model that simplifies this landscape, enabling us to navigate it more easily and clearly...
The Art of Choice: A Guide to Informed Decision-Making
Event Recording
The Art of Choice: A Guide to Informed Decision-Making
Choosing the right software to meet your business needs today and in the future is both essential and challenging. Our workshop, "The Art of Choice," will guide you through five key areas of...
Implementing Zero Trust Principles: Crafting Your Cybersecurity Fabric
Event Recording
Implementing Zero Trust Principles: Crafting Your Cybersecurity Fabric
This interactive workshop will provide a practical approach to understanding and applying Zero Trust principles in creating your cybersecurity architecture. We will focus on transitioning from...
Previous
5 6 7 8 9 10 11 Next