We appreciate you getting in touch!
One of our colleagues will reply by email as soon as possible. Have a great day!
Credit Card Skimming Surges Ahead of Holiday Shopping Season
As the shopping season approaches, there is a concurrent rise in cyber threats, with credit card skimming emerging as a significant concern, according to an article by Malwarebytes. The vulnerability lies in the security of online stores, which may not be as robust as consumers assume. When these platforms are hacked, the sensitive credit card […]
Federal Reserve Watchdog Warns of Crypto Stablecoin Risks and Calls for Strong Regulation
The Federal Reserve’s top bank watchdog, Michael Barr, has expressed concerns about crypto stablecoins potentially becoming private money that could destabilize the US financial system without proper regulation, according to an article by Bloomberg. Barr emphasized the need for strong federal regulation to ensure the Federal Reserve’s oversight of stablecoin issuers, including wallets. He advocated […]
The Crucial Role of Translation in FCPA Risk Management
The U.S. Foreign Corrupt Practices Act (FCPA) holds significant weight in international regulatory compliance, aiming to prevent bribery by individuals and companies, both in the U.S. and abroad. The law requires transparent record-keeping and can result in severe penalties, including monetary fines and imprisonment for individuals. That’s why, according to an article by Linguistic Systems, […]
Report Reveals Disconnect Between Developers and CISOs on Software Supply Chain Security Priorities
A recent report by Chainguard highlights the importance of software supply chain security for both developers and Chief Information Security Officers (CISOs). The survey reveals that 70% of developers and 52% of CISOs consider software supply chain security a top priority in their roles, according to an article by Help Net Security. However, the report […]
Unraveling the Impact of Private Equity on FCPA Compliance in Portfolio Companies
Private equity (PE) has become a subject of concern due to its vast scale, according to an article on the FCPA Blog, PE firms held $6.3 trillion in assets and $2 trillion in uninvested cash as of 2021. The sheer number of PE firms globally, managing assets in 40,000 portfolio companies, has led to a […]
Proposed Rule Seeks To Establish Comprehensive Quality Control Standards For Mortgage AVMs
The landscape of real estate valuation is on the brink of transformation with the introduction of a proposed rule by key U.S. regulatory agencies, according to an article by Dechert LLP. The proposed rule, introduced by multiple U.S. regulatory agencies, aims to establish quality control standards for mortgage originators and issuers of mortgage-backed securities utilizing […]
SEC Mandates Tightened Cybersecurity Disclosures: Navigating Rules, Risks, and Supply Chain Imperatives in the Wake of SolarWinds Case
The U.S. Securities and Exchange Commission (SEC) has implemented rules compelling public companies to enhance disclosure of material cybersecurity incidents, risk management strategies, and governance, according to an article by BlankRome. The recent SEC charges against SolarWinds and its Chief Information Security Officer (CISO) for alleged fraud and internal control failures highlight the criticality of […]
Essential Risk Management Strategies: Safeguarding Construction Projects Through Comprehensive Contractual Measures
In the realm of construction, grappling with legal intricacies in the aftermath of accidents can be daunting. Whether overseeing projects for apartments, malls, restaurants, factories, or other commercial spaces, a comprehensive grasp of contractual risk transfer is indispensable. To ensure holistic protection, a Risk Management Magazine article suggests establishing these five crucial contract requirements: Hold […]
AI’s Impact on Healthcare Cybersecurity and Strategies for Risk Managers
AI has markedly transformed the cybercrime landscape in healthcare, enabling cybercriminals to automate and scale attacks, identify vulnerabilities, and analyze large datasets for identity theft or ransomware, according to a Help Net Security interview with Troy Hawes, Managing Director at Moss Adams. The efficiency and sophistication of these AI-powered attacks pose a substantial challenge, necessitating […]