Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
The C5:2020 - A Valuable Resource in Securing the Provider-Customer Relationship for Cloud Services
KuppingerCole has accompanied the unprecedented rise of the cloud as a new infrastructure and alternative platform for a multitude of previously unimaginable services – and done this...
Learn more
Executive View
Executive View
Micro Focus ArcSight
ArcSight is a modern SIEM solution that provides an advanced security analytics platform for storing, analyzing, and visualizing information from multiple sources and converting it into actionable...
Learn more
Event Recording
Event Recording
Cyber Insurance as a Damage Mitigation Strategy
Digital transformation came with a wide range of advantages, but it also opened the door to potential cyberattacks. Every organization faces the risk to be the target of a cybercrime, but...
Learn more
The Bletchley Declaration: The Imitation Game of a Different Kind
Blog
The Bletchley Declaration: The Imitation Game of a Different Kind
Last week, the United Kingdom hosted the AI Safety Summit, the first ever international conference on the safety and regulation of artificial intelligence. With attendees from over 30 governments...
Foresight Consulting in Cybersecurity
Blog
Foresight Consulting in Cybersecurity
Cybersecurity professionals sometimes must predict the future to be able to know what to do in the present. With SAFIRE scenarios they can get a real edge over cyber criminals.
The Human Vector
Blog
The Human Vector
Every cybersecurity professional who has used ChatGPT or any other GPT has had one of the four impulses our guest author Jürgen Schulze discusses in this blog.
How Useful is Cybersecurity Awareness Training Really? - Cybersecurity Fact or Fiction Part 2
Video
How Useful is Cybersecurity Awareness Training Really? - Cybersecurity Fact or Fiction Part 2
In part two of "Cybersecurity Fact or Fiction," our esteemed analysts, Matthias Reinwarth, Alexei Balaganski, Marina Iantorno, and Paul Fisher, continue their thrilling quest to distinguish...
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
Analyst Chat
Analyst Chat #194: The Synthetic Revolution: How AI-Generated Data is changing Privacy and Security
In this episode, Marina discusses the intricacies of synthetic data, AI-generated datasets that mimic real data without revealing personal information. Marina and Matthias explore its significant...
Are Boomers Most Vulnerable to Cyber Attacks? - Cybersecurity Fact or Fiction Part 1
Video
Are Boomers Most Vulnerable to Cyber Attacks? - Cybersecurity Fact or Fiction Part 1
To commemorate Cybersecurity Awareness Month 2023, Matthias Reinwarth, Alexei Balaganski, Marina Iantorno, and Paul Fisher came together to play "Cybersecurity Fact or Fiction". This captivating...
ReliaQuest GreyMatter
Executive View
ReliaQuest GreyMatter
Dieser Executive View Report von KuppingerCole befasst sich mit den Herausforderungen im Bereich der Cybersicherheit und den Optionen, die den Sicherheitsverantwortlichen für Managed Security...
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Blog
Information and Cyber Warfare: Implications for State Strategies and Cybersecurity
Join Alexander Klimburg, Senior Fellow at the Hague Center for Strategic Studies and former Head of the Center for Cybersecurity at the World Economic Forum, as he discusses the concepts of...
„Cyberkriminalität profitiert von sicheren Häfen“
Blog
„Cyberkriminalität profitiert von sicheren Häfen“
Cyberkriminelle nutzen Desinformationskampagnen, um Informationssicherheitssysteme auszuhöhlen. Unser Gespräch mit dem Chefredakteur des Tagesspiegel Background Cybersecurity beleuchtet, wie der...
Cloud Security Alphabet Soup
Blog
Cloud Security Alphabet Soup
Is securing your cloud security different from securing other forms of IT? You would think so from the alphabet soup of acronyms around the subject.
1 2 3 4 5 6 7 Next