Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
CSLS Speaker Spotlight: Vodafone's Andrzej Kawalec on Ransomware
Andrzej Kawalec, Head of Cybersecurity at Vodafone Business, will give a presentation entitled Ransomware: What Happens When the Tech Stops? on Thursday November 11 from 09:30 pm to 09:50 am at...
Learn more
Advisory Note
Advisory Note
EU Digital Operational Resilience Act (DORA)
Operational resilience is essential for every organization embracing digital transformation to ensure that all business IT systems are able to resist and recover from any type of disruption,...
Learn more
Event Recording
Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Building and running cyber security in both worlds modern cloud security in combination and legacy on premises introduces extra complexity.  Some of the well known security patterns and...
Learn more
Analyst Chat #187: Securing the Autonomous World 
Analyst Chat
Analyst Chat #187: Securing the Autonomous World 
In this episode, Matthias sits down with Nitish Deshpande to cover the intricacies of 'Securing the Autonomous World by Reinforcing Cybersecurity.' From understanding the challenges posed by...
Cybersecurity Resilience with Generative AI
Advisory Note
Cybersecurity Resilience with Generative AI
Cyberattacks have intensified in recent years. The evolving threat landscape is exemplified by the persistent threat of cyberattacks, driven by cybercriminals' exploration of new tools and...
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Blog
Securing Tomorrow: Quantum Computing Horizons in Cybersecurity
Dive into the enigmatic realm of quantum computing, where advanced technology parallels magic. While space exploration and AI seamlessly integrate into daily life, quantum computing remains a...
Analyst Chat #186: Cybersecurity in an AI-Powered Digital World - Introducing cyberevolution
Analyst Chat
Analyst Chat #186: Cybersecurity in an AI-Powered Digital World - Introducing cyberevolution
In the latest episode of Kuppinger Analyst Chat, host Matthias sits down with KuppingerCole's CEO Berthold Kerl and the Director of the Practice Cybersecurity Christopher Schütze to discuss...
Fight Fraud With Fraud Reduction Intelligence Platforms (FRIP)
Webinar Recording
Fight Fraud With Fraud Reduction Intelligence Platforms (FRIP)
In today's digital landscape, businesses face an increasing threat of fraud that can lead to significant financial losses and damage to their reputation. To effectively combat fraud, businesses...
Beyond Boundaries: The Geopolitics of Cyberspace
Blog
Beyond Boundaries: The Geopolitics of Cyberspace
The concept of sovereignty serves as the foundation for various rules and principles of international law and is considered to be the cornerstone of international law. The modern conception of the...
Analyst Chat #185: A New Hope for Cyber Defenders
Analyst Chat
Analyst Chat #185: A New Hope for Cyber Defenders
Alexei Balaganski and Matthias discuss the current state and future of AI in cybersecurity. The conversation explores the role of AI, machine learning, and deep learning in bolstering...
Protection Against Multi-Vector DDoS and Bot Attacks
Video
Protection Against Multi-Vector DDoS and Bot Attacks
Join John Tolbert, Director of Cybersecurity Research at KuppingerCole, in this insightful episode featuring George Tarasov, Product Manager at Qrator Labs. Explore the world of multi-vector DDoS...
Tanium XEM Platform
Executive View
Tanium XEM Platform
This KuppingerCole Executive View report looks at the Tanium XEM Platform, which takes a proactive approach to enterprise-level risk and compliance management to all endpoints.
Securing the Autonomous World by Reinforcing Cybersecurity
Blog
Securing the Autonomous World by Reinforcing Cybersecurity
Automation powered by artificial intelligence and machine learning has grown exponentially in the past few years. Companies are leveraging the benefits of automating to simplify complex and...
Previous
1 2 3 4 5 6 7 Next