Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

KC Open Select
KC Open Select
Fraud Reduction Intelligence Platforms
The Fraud Reduction Intelligence Platform market is mature and still growing in response to increased fraud risk levels globally.
Learn more
Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Are You Prepared for the True AD Disaster?
Have you ever experienced a major IT outage caused by issues with directory services such as Microsoft Active Directory? If not, you surely have heard about others that came into trouble here....
Learn more
Blog
Blog
KuppingerCole Analyst Chat: Cybersecurity in the Enterprises in the Age of WFH
Matthias Reinwarth and Martin Kuppinger are discussing the security challenges enterprises are now facing with the majority of employees working from home.
Learn more
Leadership Brief
Leadership Brief
Machine Customers - The Impact of Consumer Bots on Customer Journeys
Machine customers are already present in many markets, driven by trends such as IoT. This leadership brief gives an overview on how to prepare to satisfy the needs of consumer bots and other...
Learn more
Webinar Recording
Webinar Recording
Maximizing Cyber Security Investments in Economically Turbulent Times
Join security and business experts from KuppingerCole Analysts and Cyfirma as they discuss the challenges of ensuring an effective cyber defense strategy on a limited budget. They will then look...
Learn more
Three Pillars of Secure Development - Why Nobody Cares and How to Fix That
Event Recording
Three Pillars of Secure Development - Why Nobody Cares and How to Fix That
Speed to market, extensive use of so-called standards and the quest for low cost: Successful product development is using lopsided metrics. That comes with a big penalty - from physical product...
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Event Recording
Fraud Reduction Intelligence Platforms (FRIPs): Critical Capabilities & Market Overview
Fraud is a major cost to businesses worldwide. Cybersecurity Ventures estimates that cybercrime costs will reach $10.5 trillion by 2025. Banking, finance, payment services, and retail are some of...
How Deepfakes Are Changing the Landscape of Identity Fraud and How Can We Prevent the Risks
Event Recording
How Deepfakes Are Changing the Landscape of Identity Fraud and How Can We Prevent the Risks
Explore the latest developments in deepfake technology and its impact on identity fraud. With deepfakes becoming increasingly realistic and widespread, it is essential for businesses and...
Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
Event Recording
Cyber Criminals by Design – Using Digital Twins to Understand Misbehavior
A digital twin is a virtual representation of a real-life subject. This mapping encompasses its entire lifecycle, is updated from real-time data, and uses simulation, machine learning, and...
How Much Data do You Need to Collect to Really Know Your Customer
Event Recording
How Much Data do You Need to Collect to Really Know Your Customer
Overview of types of data and how it can be used as well user consent models that organizations should consider with consumer facing services
From Identity Theft to Identity Threat to Identity Security
Event Recording
From Identity Theft to Identity Threat to Identity Security
Identity has been always an ambiguous term. Identities exist in a sociocultural and organizational context and in technical ones. We have Digital Identities and eIDs and not only do individuals...
The AML-Compliant ID-Wallet
Event Recording
The AML-Compliant ID-Wallet
AML-compliant customer identification in the finance and banking sector (KYC) in Germany is subject to the requirements of BaFin (the regulatory authority) and the Money Laundering Act. This...
Beware of the Dark Side… Shining a Light on Supply Chain Security
Event Recording
Beware of the Dark Side… Shining a Light on Supply Chain Security
How do we control what we do not see? Supply chains are like that. The problem is that while you may have sight of your nearest third-party relationships, if you look further out to their...
The eID Threat Landscape – Stay Ahead of the Fraudsters
Event Recording
The eID Threat Landscape – Stay Ahead of the Fraudsters
Cash grab-robberies are out, online fraud is in. When multinational hacker groups target senior and vulnerable citizens as a business model. Learn how BankID is fighting fraud and helps you...
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Event Recording
Cyber-Defense Strategies to Protect Cloud Resources & Identities
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Attackers have also realigned their efforts, focusing on staying...
Previous
3 4 5 6 7 8 9 Next