Insights

Fraud Prevention

Account takeover (ATO) and account opening (AO) attacks harm consumers and enterprises. Fraudsters are constantly evolving their tactics, which leads to financial losses. Fraud reduction services help their customers to recognize malicious attempts to take over and/or create unauthorized accounts, thereby saving money and protecting reputations.

Master Class
Master Class
Incident Response Management
In this KC Master Class you learn how to react adequately when a cyberattack has occurred in your company. Our analysts will prepare you for this worst case scenario by showing you how to rate...
Learn more
Tools Choice
Tools Choice
Security Orchestration, Automation and Response (SOAR)
This Tools Choice enables you to find the perfect SOAR vendor and solution for your IT infrastructure. Based on vendor-neutral research from our independent analysts, we have examined products and...
Learn more
Webinar
Webinar
Mehr Widerstandsfähigkeit gegen Cyberangriffe: Das Automatisierte SOC
Cybersicherheit ist zu einer zentralen Herausforderung für jedes Unternehmen geworden. Die Widerstandsfähigkeit, also die Cyber Resilience, ist inzwischen elementar für die Überlebensfähigkeit von...
Learn more
Blog
Blog
Autonomous Machines Transforming Business
Comprehending the Current and Future Transformation of Business by Autonomous Machines Self-driving cars! Not so fast, autonomous devices include much more than just vehicles. Autonomous...
Learn more
Executive View
Executive View
CYFIRMA DeCYFIR
Reaktive Sicherheitsmaßnahmen wirken auf Cyberangriffe, die bereits stattgefunden haben. Während die Ausgaben für die Cybersicherheit steigen, werden auch Cyberangriffe immer zahlreicher. Um...
Learn more
Event Recording
Event Recording
Government's Role in Providing a Secure Framework for Digital Transformation
This keynote will explore the role of government in providing a secure framework for digital transformation.
Learn more
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
Event Recording
Continuous Zero Trust Transformation using a Value and Risk Driven Approach
For big companies like Mercedes, there is no generic zero trust implementation to deliver the values for customer, workforce, suppliers and logistics.  It is unlikely to have a greenfield...
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
Event Recording
UNECE R 155: Security-by-Design for the Automotive Supply Chain and In-Vehicle Cybersecurity
 
Welcome to CSLS 2022
Event Recording
Welcome to CSLS 2022
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
Event Recording
Panel | Best Practices for Implementing Enterprise Security Automation for Threat Detection and Intelligence
As the intensity and sophistication of cyber-attacks continues to increase amidst an uncertain threat landscape, enterprises are actively looking to embrace security automation as a potential...
Sustainable Vulnerability Management: Case Study by KuppingerCole
Event Recording
Sustainable Vulnerability Management: Case Study by KuppingerCole
For any large company, regulated or not, it is essential to have a mechanism or process for detecting vulnerabilities. For this purpose, various scanners exist that can automatically scan the...
Ask Just Anything
Event Recording
Ask Just Anything
Managing the Cyber Security Technical Debt: How did we get there? And what to do about it?
Event Recording
Managing the Cyber Security Technical Debt: How did we get there? And what to do about it?
This presentation will explore why companies need security automation. We will look at how companies can ensure success (and how to ensure failure). Leveraging professional experience and...
Panel | Overcoming vulnerabilities around Human Factors
Event Recording
Panel | Overcoming vulnerabilities around Human Factors
Human factors continue to be a weak link in enterprise defence strategies. This panel session will explore vulnerabilities around human factors and will look into security initiatives that have a...
CSLS Wrap Up and Closing Keynote
Event Recording
CSLS Wrap Up and Closing Keynote
Who the @!%# Is User1?!
Event Recording
Who the @!%# Is User1?!
The explosion of  connected things and  remote work  is presenting digital enterprises with both opportunities and challenges. In today’s distributed workscape,...
Previous
1 2 3 4 5 6 7 Next