Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Cybersecurity: A basic business requirement
Cybersecurity is a basic and essential requirement for today’s organizations because they are increasingly reliant on IT, particularly as businesses becomes more digital, and this makes them...
Learn more
Whitepaper
Whitepaper
Geistiges Eigentum schützen und gleichzeitig geschäftliche Agilität ermöglichen mit R&S®Trusted Gate von Rohde & Schwarz Cybersecurity
Viele Branchen, insbesondere diejenigen, die einerseits zusammenarbeiten und Informationen austauschen und andererseits mit streng vertraulichen Informationen und staatlicher Wirtschaftsspionage...
Learn more
Event Recording
Event Recording
Achievement Unlocked: Navigating the Labyrinth of Cyber Leadership
The role of a CISO has expanded beyond technical competence and compliance – an uncertain threat landscape calls for a technically competent leader with strategic oversight across the board,...
Learn more
Exercising Your Cyber Crisis Plans
Event Recording
Exercising Your Cyber Crisis Plans
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Event Recording
Best Practices to Protect your APIs and Accelerate your DevOps Journey.
Strategic Approaches to Secure Industrial Control System Environments
Event Recording
Strategic Approaches to Secure Industrial Control System Environments
 
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Event Recording
How a Shoemaker Stole the City Treasury and Ended up as a Social Engineering Legend
Cyber Security traditionally has been seen as the domain of Technology, with an expectation that the solution for cyber resilience has to be provided by IT – and we happily accepted this...
Debunking Common Myths About XDR
Event Recording
Debunking Common Myths About XDR
Standards & Regulatory Frameworks Are Static, Security Isn't
Event Recording
Standards & Regulatory Frameworks Are Static, Security Isn't
Current frameworks from Cyber Essentials in the UK, to the NIST Cyber Security Framework, HIPPA, PCI-DSS and even ISO27002:2022 often take at least 18-24 months to agree by their governance...
How the Current Crisis could become a Catalyst for Various Transformations
Event Recording
How the Current Crisis could become a Catalyst for Various Transformations
Cyber Warfare - A Reality Check
Event Recording
Cyber Warfare - A Reality Check
Cyber Warfare and Disinformation have been heavily weaponized since Russia´s full-scale Invasion of Ukraine and even before, aiming at destabilizing the free part of the world. It is the...
Assessing your Cybersecurity Tools Portfolio: Optimize Cost, Increase Security
Event Recording
Assessing your Cybersecurity Tools Portfolio: Optimize Cost, Increase Security
Most organizations don’t suffer from a lack of cybersecurity tools. They suffer from the cost and administrative burden of running too many of these. They suffer from the lack of...
Protecting Infrastructure in an Exposed Environment
Event Recording
Protecting Infrastructure in an Exposed Environment
Previous
1 2 3 4 5 6 7 Next