Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
Sind die BSI Richtlinien für Gesundheitsanwendungen richtig und ausreichend?
Nie war Digital Healthcare so wichtig wie heute, in Zeiten von COVID-19. Das Bundesamt für Sicherheit in der Informationstechnik (BSI) hat eine Richtlinie für sichere Anwendungen im...
Learn more
Leadership Brief
Leadership Brief
Responding to Critical Software Vulnerabilities
New software vulnerabilities are being discovered all the time and each provides an opportunity for cyber adversaries to disrupt your business. Where a new vulnerability affects a widely used...
Learn more
Interview
Interview
How CYFIRMA Puts Threat Intelligence Into Practice
Do you know what information about your company is out there and can be used by cybercriminals? What are they interested in? Are they actually targeting your company and planning to exploit it?...
Learn more
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Blog
The Triple Threat: AI Ethics, Bias, and Deepfakes in Cybersecurity
Artificial intelligence has radically transformed the field of cybersecurity. Although it is considered a game changer, the adoption of AI presents significant ethical challenges, bias, and the...
Analyst Chat #175: Advancements in Fraud Prevention
Analyst Chat
Analyst Chat #175: Advancements in Fraud Prevention
Matthias invites John Tolbert to discuss Fraud Reduction Intelligence Platforms (FRIP) with him. Discover the evolving landscape of fraud prevention and detection, the key technologies used in...
Speeding Up Zero Trust Delivery Using Managed Services
Webinar Recording
Speeding Up Zero Trust Delivery Using Managed Services
Join security experts from KuppingerCole Analysts and iC Consult as they discuss how to combine a Zero Trust security model with IAM Managed Services to achieve an optimal cybersecurity posture...
Cyber Insurance: Results from a Recent Survey
Event Recording
Cyber Insurance: Results from a Recent Survey
After several tumultuous years, the cyber insurance safety net is in question as costs rise and coverage contracts. Research conducted with IT security professionals to understand the real-life...
Cyber Insurance as a Damage Mitigation Strategy
Event Recording
Cyber Insurance as a Damage Mitigation Strategy
Digital transformation came with a wide range of advantages, but it also opened the door to potential cyberattacks. Every organization faces the risk to be the target of a cybercrime, but...
How to Get Your Cyber Insurance, Bring Down the Premium and Up the Coverage
Event Recording
How to Get Your Cyber Insurance, Bring Down the Premium and Up the Coverage
More and more it becomes difficult to Insure yourself against a Cyber attack. Understanding all the different vectors of your risk posture, the flood of different tools and checklists that...
The Future of IAM & Cybersecurity is Policy-Based
Event Recording
The Future of IAM & Cybersecurity is Policy-Based
There are several sessions at this year’s EIC looking at the roles of policies in IAM, for modernizing and efficiency gains in IGA, for authentication and fraud detection, and for...
Real-time Fraud Detection - Challenges and Solutions
Event Recording
Real-time Fraud Detection - Challenges and Solutions
Fraud can be considerably reduced via speed, scalability, and stability. Investigating fraudulent activities, using fraud detection machine learning is crucial where decisions need to be made in...
Reducing Complexity – Introducing a Practical Model for Security Classifications
Event Recording
Reducing Complexity – Introducing a Practical Model for Security Classifications
Practical Cyber Security Architecture: Reducing complexity – Introducing a practical model for security classifications. Building and running cyber security in both worlds modern cloud...
Creating the Identity Driven Cybersecurity Mesh Architecture
Event Recording
Creating the Identity Driven Cybersecurity Mesh Architecture
In overcoming the ancient concept of firewalled enterprise perimeters, securing identities has become the core element of a future driven Cybersecurity Mesh Architecture, with a composable...
Previous
2 3 4 5 6 7 8 Next