Cybersecurity
Types of cloud security
Cloud environments demand continuous maintenance, making cloud security essential to…
Cybersecurity
Benefits of network management
Fast and reliable networks are essential for businesses. Employees rely…
Cybersecurity
What is the best server for a private equity firm?
Your teams rely on fast data access and modeling applications…
Uncategorized
Risks of Not Being Compliant With SEC Cybersecurity Guidelines
Cybersecurity noncompliance results from neglecting the guidelines established by the…
Cybersecurity
Why private equity firms need cybersecurity?
Although hedge funds, family offices, and other asset managers must…
Cybersecurity
What are endpoint services?
Any device that connects to a computer network is an…
Cybersecurity
What is the easiest way to switch IT providers?
There are many reasons why your organization might consider switching…
Cybersecurity
Cybersecurity Statistics
The cybersecurity world is always changing. Annual statistics can give…
Cybersecurity
What is the best database for a hedge fund?
The best database for a hedge fund prioritizes scalability, performance,…
Cybersecurity
SEC Fines R.R. Donnelley & Sons Co. Over $2 Million for Cybersecurity-Related Violations
The SEC announced on June 18, 2024, that R.R. Donnelley…
Cybersecurity
SEC Releases New Statement on its Cybersecurity Disclosure Requirements
On May 21, 2024, the Securities and Exchange Commission (SEC)…
Cybersecurity
Navigating the Intersection of Cybersecurity & Compliance
The cybersecurity risk management regulations for publicly traded companies, issued by…
Cybersecurity
Be ready for the new SEC Cybersecurity Risk Management Rules
The U.S. Securities and Exchange Commission is set to pass…
Cybersecurity
7 Things To Do To Prepare For The SEC’s Cyber Risk Management Rules
The U.S. Securities and Exchange Commission (SEC) recently issued final…
Cybersecurity
SEC Disclosure Rule for Public Companies: Reportable Material Incident
Understanding the New Rule In a move to standardize and…
Uncategorized
SEC’s Final Rule for Public Companies on Cybersecurity Risk Management
Recognizing the increasingly sophisticated nature of cyber threats, the Securities…
Cybersecurity
Is Governance Missing From Your Firm’s Approach to Cybersecurity?
In April 2023 the National Institute of Standards and Technology…
Cybersecurity
Proton Announces Proton Pass: The Next-Level Password Manager
With password-related vulnerabilities among the most common cyber-attack vectors in…
Cybersecurity
Vendor Due Diligence Cybersecurity Checklist for New SEC Rules
Critical business operations rely on technology and tech suppliers. As…
Cybersecurity
SEC Cybersecurity Rule Changes: The Straight Path to Now
On February 9th, 2022 the United States Securities and Exchange…
Cybersecurity
SEC Rule 38a-2 Means You Can’t Ignore Cyber Governance Anymore
On February 9, 2022, the Securities Exchange Commission (SEC) published…
Cybersecurity
Changes in Cybersecurity are Coming in 2022
In 2021, SEC Commissioner Elad L. Roisman gave a speech…
Cybersecurity
Colonial Pipeline Ransomware: What We Can Learn from This Attack
The Colonial Pipeline ransomware attack in May 2021 had the most far-reaching impact of…
Cybersecurity
Keep Your Data Safe During a Nation-State Threat
Just when you think the dust has settled from the…
Cybersecurity
Your Network is Only as Secure as Your Vendors’ Networks
With supply chain attacks dominating recent headlines, companies are re-evaluating how third-party vendor behavior…
Cybersecurity
Are Portfolio Companies Ready for Business as Usual?
Coming out of the height of COVID-19, how are portfolio…
Private Equity
Are Your Portfolio Companies Vulnerable to COVID-19 Phishing Scams?
Phishing attacks targeting private equity firms’ portfolio companies aren’t new,…
Cybersecurity
How To Protect Private Equity Firms From Wire Transfer Fraud
Wire and payment transfer fraud are two of the top…
Cybersecurity
Your Portfolio Companies are Under Siege
In light of an increased threat of cyber-attacks from Iran,…
Cybersecurity
Changing Threat of Email Attacks on Private Equity Firms
Email attacks continue to be the most used and most…
Cybersecurity
Here are the Top 3 Portfolio Company Cybersecurity Risks
As breaches and compliance violations increase in the headlines, private…
Cybersecurity
How the Most Secure Private Equity Firms Manage Deal Data
“We can’t do that,” was the response from IT. The…