Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Adding Bread to the Sandwich: Beyond MITRE D3FEND
Commissioned by HCL Software Over the past years, various frameworks and models for defending against cyber-attacks have been published. A popular one is the NIST CSF (Cybersecurity...
Learn more
Leadership Compass
Leadership Compass
Security Orchestration Automation and Response (SOAR)
This report provides an overview of the SOAR market and a compass to help you find a solution that best meets your needs. We examine the SOAR market segment, product/service functionality, relative...
Learn more
Webinar Recording
Webinar Recording
Making Passwordless Authentication a Reality: The Hitchhiker’s Guide
In this webinar, Bojan Simic, founder and CEO at HYPR, and Martin Kuppinger, Principal Analyst at KuppingerCole Analysts, share their insights and experience on what to consider when moving...
Learn more
How to Find the Best IT Solution for Your Business
Blog
How to Find the Best IT Solution for Your Business
Finding the right cybersecurity solution for your business can be challenging. Find out how to uncover the right tool for your organization. 
CSLS 2022 Is a Wrap
Blog
CSLS 2022 Is a Wrap
Cybersecurity Leadership Summit 2022 was a great success. Thank you to everyone who made it happen.
Cyber Resilience
Blog
Cyber Resilience
In the post-pandemic world, most people understand the concept of resiliency, which refers to the capacity to recover quickly from some form of adversity - be that Covid-19 infection, cyber-attack,...
Preventing Supply Chain Attacks
Blog
Preventing Supply Chain Attacks
Supply chain attacks have become a major concern for every kind of organization. Which role does Governance, Risk, and Compliance (GRC) play in all this and what does the future hold for enterprises?
What We Can Learn from DeFi and Crypto Exchange Attacks
Blog
What We Can Learn from DeFi and Crypto Exchange Attacks
Attacks on DeFi platforms occur often enough to show that proper cyber hygiene is necessary no matter how cutting edge the technology is.
Do You Really Need a VPN?
Blog
Do You Really Need a VPN?
Nothing is as misunderstood as a VPN. Some providers claim that their VPN makes browsing safer and improves privacy. Is that really the case, or could it make things worse? Read now and find out!
Cyber Supply Chain Security
Blog
Cyber Supply Chain Security
Every business has a supply chain upon which it relies. Any disruption to that a supply chain has a knock-on effect on all the businesses that depend on it. Most organizations are well versed in...
The Importance of SME’s Cybersecurity
Blog
The Importance of SME’s Cybersecurity
Security controls are diverse and complex. Every organization faces dynamic and relentless attackers every day. Watch now and find out what insights Andrzej Kawalec provides that can make a CISO's...
Is It Possible to Recover After a Cyberattack?
Blog
Is It Possible to Recover After a Cyberattack?
Unfortunately, every organization is vulnerable to suffer a cyberattack. We have seen in the last years a considerable increase in cybercrime and the negative impact that it causes on businesses....
Cyber-Crisis Becomes an Opportunity for Insurers
Blog
Cyber-Crisis Becomes an Opportunity for Insurers
The pandemic changed our lives in many ways, some good and some bad. However, one impact has been that that cyber-attacks are more prevalent than ever before. This problem comes with opportunities....
1 2 3 4 5 6 7 Next