Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Public-Private Cooperation in Cyberspace
Managing business in today's geopolitical context In the face of a geopolitical crisis, concerns are growing about the threat of cyber-attacks to global supply chains and private organizations,...
Learn more
Leadership Brief
Leadership Brief
Cyber Hygiene: The Foundation for Cyber Resilience
Most cyber incidents result from poor cyber hygiene. To avoid these, organizations must make sure that all the routine tasks needed to keep their systems, data, and applications safe are performed...
Learn more
Video
Video
Top 5 Work from Home Cybersecurity Recommendations for Enterprises
John Tolbert is talking about the current situation with regards the pandemic crisis and the cybersecurity-related things to consider for enterprises.
Learn more
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Analyst Chat
Analyst Chat #149: The Top 5 Cybersecurity Trends - Looking Back at CSLS 2022
Deep Fakes, AI as friend and foe, Business Resilience, Mis-, Dis- and Malinformation: The Cybersecurity Leadership Summit has taken place in Berlin and covered all of this and much more. Martin...
On the Charge: Securing the Energy Sector
Event Recording
On the Charge: Securing the Energy Sector
The economic value represented by the energy industry makes utilities an attractive target for cybercriminals. An expansive attack surface coupled with strong interdependencies between physical...
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Event Recording
The Blueprint for a Cyber-Safe Society: How Denmark provided eIDs to citizens and business
Implementing digital solutions enabling only using validated digital identities as the foundation for all other IAM and cybersecurity measures is the prerequisite to establish an...
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Event Recording
A Picture is Worth a Thousand Lies: Deepfakes or AI-Generated Synthetic Media
Imagine deepfake footage of a CEO engaging in bribery, a politician committing a sexual assault just a few days before an election, or soldiers committing atrocities on foreign soil. In our...
Only Those Who Know the Dangers Can Protect Themselves
Event Recording
Only Those Who Know the Dangers Can Protect Themselves
How do cyber criminals go about a hacking attack and how easy is it to capture sensitive data? As the saying goes, "Keep your friends close, but your enemies closer," we take a look at how hackers...
Rethinking Cybersecurity From the Human Element Point of View
Event Recording
Rethinking Cybersecurity From the Human Element Point of View
Over simplifying, IT security means defending the IT systems from threats procured by cybercriminals. Their targets are, for example, the manipulation of systems, the extorsion or exfiltration of...
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
Event Recording
Know Your Enemy and Know Yourself, How to Win at Cyber Warfare and Turn You People From the Weakest Link to a Defence Mechanism
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat....
Awareness?! How to Make It Work in a Low-Tech Environment
Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Event Recording
Panel | Cyber Hygiene Best Practices: Why Does It Matter?
Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called  cyber hygiene.  Enterprises today deal wih a sheer volume users, data and...
Cyber Hygiene Is the Backbone of an IAM Strategy
Event Recording
Cyber Hygiene Is the Backbone of an IAM Strategy
When speaking about cybersecurity, Hollywood has made us think of hooded figures in a dark alley and real-time cyber defense while typing at the speed of light. However, proper cyber security...
Previous
1 2 3 4 5 6 7 Next