Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
A paradigm for unified delivery of IT services to the business demand, based on automated, policy-based management, and supported by the unification of heterogeneous multi-cloud multi-hybrid IT...
Learn more
Whitepaper
Whitepaper
Geistiges Eigentum schützen und gleichzeitig geschäftliche Agilität ermöglichen mit R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirtschaftsspionage...
Learn more
Analyst Chat
Analyst Chat
Analyst Chat #111: From SIEM to Intelligent SIEM and Beyond
A comprehensive cybersecurity strategy typically includes the use of modern, intelligent Security Information and Event Management (SIEM) platforms. These go far beyond simply aggregating and...
Learn more
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
Blog
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
A paradigm for unified delivery of IT services to the business demand, based on automated, policy-based management, and supported by the unification of heterogeneous multi-cloud multi-hybrid IT...
Dark Side Ransomware Attacks
Blog
Dark Side Ransomware Attacks
Last week Colonial Pipeline, one of the largest pipelines in the US, was hit by a ransomware attack from the Dark Side cybercrime group. While many pertinent specifics about the attack are not...
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
Blog
Why Digital Trust Is at the Top Of CXOs’ Agenda… Even if They Don’t Realise It
When thinking about the C-suite’s priorities, people tend to focus on growth, security, digital transformation or, more recently, keeping a remote workforce running. All of these aspects are...
OneTrust Acquisition of Convercent
Blog
OneTrust Acquisition of Convercent
OneTrust, provider of data privacy, security, and governance solutions has announced that it will acquire Convercent, an enterprise GRC solution with an ethics and compliance portal. Slotting...
Time CISOs Stopped Trying to Speak to the Board?
Blog
Time CISOs Stopped Trying to Speak to the Board?
I have been covering cybersecurity issues, first as a journalist then as an analyst, since 2006. In that 15 years I have heard the mantra that security is a boardroom issue hundreds of times. The...
Why Enterprises Are Choosing SOAR for SOCs
Blog
Why Enterprises Are Choosing SOAR for SOCs
Security Orchestration, Automation, and Response (SOAR) platforms are attracting a lot of attention from many organizations, from enterprises to government agencies and even those on the upper end...
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
Blog
Symphony Technology Group (STG) Acquires McAfee Enterprise Business
STG announced that they intend to acquire McAfee’s enterprise business for around $4B. The McAfee brand will continue to operate and focus on consumer cybersecurity. STG will pick up...
Ivanti’s Zero Trust Journey
Blog
Ivanti’s Zero Trust Journey
Ivanti has completed its acquisition of MobileIron and Pulse Secure. Ivanti, headquartered in Salt Lake City, had its roots in desktop management (LANDESK), evolved into endpoint and patch...
We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance
Blog
We Are Detective: Data Scientists to the Rescue for Cybersecurity and Governance
If the line "We are detective" only reminds you of "guilty pleasure" radio songs from the 1980s, despite the fact that you are responsible for cybersecurity or compliance in your company,...
Cybersecurity Awareness – Are We Doing Enough?
Blog
Cybersecurity Awareness – Are We Doing Enough?
It’s October and it means that we are having the European Cybersecurity Month again. ECSM is the European Union’s annual campaign dedicated to promoting cybersecurity among EU...
10 Use Cases for Universal Privilege Management
Blog
10 Use Cases for Universal Privilege Management
Even before COVID-19 entered our lexicon, privileged access management (PAM) was widely recognized as a foundational cybersecurity technology . In recent years, almost every cyberattack has...
AI-Powered Data for All – Informatica's Acquisition of GreenBay Technologies
Blog
AI-Powered Data for All – Informatica's Acquisition of GreenBay Technologies
Informatica has just announced that they have made another acquisition this summer: GreenBay Technologies, a startup focused on AI and machine learning. Read about their July 2020 acquisition...
Previous
5 6 7 8 9 10 11 Next