Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Web 3.0 Creates a World Without Perimeters
The visions of Web3 will be mainstream one day but how we implement security and trust, is still up for debate. We are on the threshold of further evolution and must set the right course. But how?...
Learn more
Whitepaper
Whitepaper
Automating the SOC
SOAR, Security Orchestration, Automation and Response, is the latest in a line of security buzzwords to hit the market; and while SOAR may have only emerged in the last few years, it is fast...
Learn more
Event Recording
Event Recording
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Attackers are expected to leverage the uncertain geopolitical landscape to carry out advanced cybercrime attacks, leaving businesses susceptible to intrusions that could have potential second and...
Learn more
The Changing Face of Resilience
Event Recording
The Changing Face of Resilience
Resilience has been changing over the last 15-20 years, where we now accept and acknowledge the various types of reslience an organisation should be responding to. This session will explore how...
NIS2 Directive – What It Is and Why You Need to Prepare
Event Recording
NIS2 Directive – What It Is and Why You Need to Prepare
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Event Recording
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Ransomware attacks continue to increase in frequency and severity. Every organization needs a ransomware and malware resilience plan. Three major components of such plans should include deploying...
Security Automation Strategies to Succeed or Fail: You Choose
Event Recording
Security Automation Strategies to Succeed or Fail: You Choose
This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and doctoral...
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Event Recording
Future-Proof Network Detection & Response for IT & OT – Made in Switzerland
Effects of Malware Hunting in Cloud Environments
Event Recording
Effects of Malware Hunting in Cloud Environments
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Event Recording
CISO Panel | Mitigating State Sponsored Attacks in Cyber-Space
Attackers are expected to leverage the uncertain geopolitical landscape to carry out advanced cybercrime attacks, leaving businesses susceptible to intrusions that could have potential second and...
Workshop | Implementation of a Risk Class Model Within Access Management
Event Recording
Workshop | Implementation of a Risk Class Model Within Access Management
In this workshop, we will show you how to implement a risk class-based approach within access management with little effort in order to achieve the highest level of control, compliance and...
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
Event Recording
Workshop | From Asset Management to Asset Intelligence: Crossing the CAASM
As the sprawl of devices, device types, and solutions continues to skyrocket, environments only grow more complex. But there's good news: asset management has evolved. Today’s...
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Event Recording
Workshop | Break the Kill Chain – An Intelligence-Led Model to Cyber Defence
Previous
2 3 4 5 6 7 8 Next