Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Hybrid Event
Hybrid Event
cyberevolution 2024
cyberevolution will return to Frankfurt in 2024! Meet 500 security experts from 3 to 5 December 2024, get ready and look forward to interactive sessions to explore cybersecurity in an AI-driven...
Learn more
Blog
Blog
The Next Best Thing After "Secure by Design"
There is an old saying that goes like this: “you can lead a horse to water, but you can’t make it drink”. Nothing personal against anyone in particular, but it seems to me that...
Learn more
Market Compass
Market Compass
Security Operations Center as a Service (SOCaaS) for the UAE
The KuppingerCole Market Compass provides an overview of the product or service offerings in a certain market segment. This Market Compass covers the Security Operations Center-as-a-Service...
Learn more
Event Recording
Event Recording
Learn How SD Worx Turned Its Cybersecurity Strategy Into a Business Enabler
Learn more
A Look at NIST’s Zero Trust Architecture
Blog
A Look at NIST’s Zero Trust Architecture
NIST, the US National Institute for Standards and Technology, recently released SP 800-207 Zero Trust Architecture . The NIST special publication examines the principles of and motivations for...
The Latest Twitter “Hack” Raises Inconvenient Questions
Blog
The Latest Twitter “Hack” Raises Inconvenient Questions
It looks like the whole world is currently talking (at least, tweeting) about the latest large-scale Twitter hack. High profile accounts of the likes of Barack Obama, Joe Biden, Bill Gates, and...
Elements of a Disaster Operations Plan
Blog
Elements of a Disaster Operations Plan
If anyone in any organization was in any doubt about the importance of having a Disaster Operations Plan, that has surely changed since the outbreak of the Covid-19 pandemic. Some organizations...
Security Fabric: Investing in the Right Architecture for a Secure Future
Blog
Security Fabric: Investing in the Right Architecture for a Secure Future
Modern and hybrid operating models, Software-as-a-Service, regulatory requirements, working from home, various types of internal and external users, and the phenomenon of BYOD (bring your own...
Cybersecurity Investment Priorities - Portfolio Optimization
Blog
Cybersecurity Investment Priorities - Portfolio Optimization
Microsoft Adding New Capabilities to Azure Active Directory
Blog
Microsoft Adding New Capabilities to Azure Active Directory
Over the past years, Microsoft has spent significant effort to make Azure Active Directory (Azure AD) the central platform for identities in Microsoft environments and beyond. Microsoft now...
3 Steps to Improve Your Cybersecurity with Enterprise Risk Management
Blog
3 Steps to Improve Your Cybersecurity with Enterprise Risk Management
If you start considering the topic of cybersecurity in your company, you’ll quickly realize that there are many facets. In traditional companies, IT has grown in parallel to meet the...
Why BCM/BCRM and Cybersecurity Must Converge
Blog
Why BCM/BCRM and Cybersecurity Must Converge
Security Should Not Become a
Blog
Security Should Not Become a "Business Disabler"
CoronaApp: Time to Act Now, Not to Talk
Blog
CoronaApp: Time to Act Now, Not to Talk
Kuppingercole's Principal Analyst Martin Kuppinger gives his opinion on problems and arguments surrounding various apps for tracking the spread of the virus. And privacy is not the biggest...
Cybersecurity of Tomorrow: Delivered Entirely From the Cloud
Blog
Cybersecurity of Tomorrow: Delivered Entirely From the Cloud
As businesses embrace the Digital Transformation and become increasingly cloud-native, mobile and interconnected, the corporate network perimeter is gradually disappearing, exposing users to...
Sind die BSI Richtlinien für Gesundheitsanwendungen richtig und ausreichend?
Blog
Sind die BSI Richtlinien für Gesundheitsanwendungen richtig und ausreichend?
Nie war Digital Healthcare so wichtig wie heute, in Zeiten von COVID-19. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat eine Richtlinie für sichere Anwendungen im...
Previous
6 7 8 9 10 11 12 Next