Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
IT for the Digital Age: Introducing BASIS – Business-Driven Agile Secure IT as a Service
A paradigm for unified delivery of IT services to the business demand, based on automated, policy-based management, and supported by the unification of heterogeneous multi-cloud multi-hybrid IT...
Learn more
Advisory Note
Advisory Note
Architecting Your SOC to Defend Against Today's Attack Vectors
Organizations must prioritize architecting a modern Security Operations Center (SOC) as it is becoming more critical for strengthening their cybersecurity defenses against sophisticated cyber...
Learn more
Event Recording
Event Recording
Risk assessment the attacker way! How secured are your assets in reality?
Attackers don’t sleep and find new ways to get into a company and move laterally through the environment. This session starts with an overview where we come from and the pure reactive...
Learn more
Warriors of the Web: cyberevolution Capture The Flag 2023
Event Recording
Warriors of the Web: cyberevolution Capture The Flag 2023
As a prelude to the captivating “Capture The Flag” competition, this session reveals what is in store for the second day of KuppingerCole's Cyberevolution conference. It provides a...
Continuous Exposure Management – XM Cyber
Event Recording
Continuous Exposure Management – XM Cyber
A demo of the XM Cyber platform will show you how we can visualize the different attack paths in your system for you. We can show you how a hacker moves laterally through your environment using...
Welcome to cyberevolution 2023
Event Recording
Welcome to cyberevolution 2023
Welcome to the cyberevolution Conference Opening! Berthold Kerl will kick off the cyberevolution Conference in Frankfurt from the 14th to the 16th of November. He will explain the idea behind...
Beyond Tomorrow: Navigating Cyber Futures via SAFIRE Scenarios (2028 / 2032)
Event Recording
Beyond Tomorrow: Navigating Cyber Futures via SAFIRE Scenarios (2028 / 2032)
Step into the future of cybersecurity in an engaging and enlightening keynote presentation featuring Jonathan Blanchard Smith from SAMI Consulting and Berthold Kerl, CEO of KuppingerCole. Join us...
Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future
Event Recording
Decoding the Consequences for Cybersecurity Using the 4 SAFIRE Scenarios of the Future
After the enlightening keynote on navigating cyber futures via SAFIRE scenarios, brace yourself for an immersive panel discussion that delves deeper into the uncharted territories of...
The future CISO in the age of AI
Event Recording
The future CISO in the age of AI
With the introduction of ChatGPT, we have entered into the knowledge age. In this new economy, CISOs are presented with new challenges. This session explores three concerns arising from...
Identity Security: Its Role for Succeeding in the Digital Journey
Event Recording
Identity Security: Its Role for Succeeding in the Digital Journey
In his talk, Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, will look at the role of identity security for succeeding in the digital journey and its impact on secure journeys,...
Revealing Hidden Dimensions of Security Beyond Data Secrecy
Event Recording
Revealing Hidden Dimensions of Security Beyond Data Secrecy
The presentation will provide a framing to help attendees navigate the rapid transition from yesterday’s industrial age security paradigms to future approaches for sustaining...
Welcome note by Minister of Interior Affairs - Hessen
Event Recording
Welcome note by Minister of Interior Affairs - Hessen
Businesses, public institutions, and government agencies face various cybersecurity issues in an increasingly connected world. This welcome session highlights current and emerging cybersecurity...
Side effects of (re)genAI impacting cyber security
Event Recording
Side effects of (re)genAI impacting cyber security
The side effects of (re)generative AI impacting cyber security   The polarizing public discussion about ChatGPT and its siblings and the smokescreens of those responsible for...
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
Foresight Consulting in Cybersecurity
Blog
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
Previous
6 7 8 9 10 11 12 Next