Security
-


Cyber Security intelligence: Imminent: Cybersecurity regulations for US financial services
The U.S. Securities and Exchange Commission’s (SEC) is expected to enact new cybersecurity regulations later this year, but the time is now for alternative investment firms to take proactive action. In this article for Cybersecurity Intelligence, Drawbridge CISO and Managing Director Simon Eyre outlines steps that firms can take today so they won’t be forced to…
-


Finextra: Why underwriters are struggling to price cyber risk insurance policies
Cyber is the most important global business risk for 2023 but underwriters are struggling to price cyber risk policies because they don’t have the tools to accurately determine their clients’ risk posture. In this article for Finextra, Drawbridge Founder and President Jason Elmer highlights why cybersecurity measures are essential and cyber insurance coverage, as an…
-


What can Investment Managers do today to minimize the work required when the SEC Cybersecurity Rule becomes final this year?
While we await the final decision that is due in April 2024, preparation to comply with the new regulation should begin now in order to show a track record of cybersecurity governance and of course to strengthen your defenses against rising cyber threats. Alternative Investment and Wealth Managers that have significant gaps in their cyber…
-


SEC cyber rule: Predictions on the final ruling
As alternative investment managers await the final SEC cyber rule, we’ve been watching SEC trends to predict how the final cyber ruling will take shape. Watch the recording from the September 13, 2023 webinar where Ryan Krebs, Former Drawbridge Head of Client Success, and Simon Eyre, Drawbridge CISO, discussed: The distinction between the cyber incident…
-

Cybersecurity Risk Alerts
Cybersecurity Law Report: Ten Cybersecurity Resolutions for Financial Services Firms in 2023 January 11, 2023 Companies in the financial services sector are a natural target for hackers given the value and nature of the data they manage. Faced with this threat, there are a number of steps firms can take to mitigate risk. In this…
-


Drawbridge Wins ‘Best Cyber-Security Service’ at the 2022 With Intelligence HFM US Services Awards
Drawbridge, a premier provider of cybersecurity software and solutions to the alternative investment industry, today announced it has been selected as ‘Best Cyber-Security Service’ at the With Intelligence HFM US Services Awards 2022. The With Intelligence HFM US Services Awards celebrate the best in hedge fund product and service providers in the US, recognizing exceptional…
-

Cybersecurity Keys to Securing Microsoft Office 365
The rise in remote work has turned the already popular Microsoft Office 365 suite into an even more widely used digital platform. Many firms rely on Microsoft Office 365 for the effective management of employees. Among other advanced online capabilities, such as version control, document sharing, and collaboration. As employees shift more interactions online, however,…
-

Cybersecurity Alert: Authentication Vendor Okta Suffers Breach
Identity provider Okta was the victim of a breach perpetrated by a hacking group known as Lapsus$. The impact and extent of the breach are still being investigated; however, several details have been released: The attacker had access to an Okta engineer’s laptop for five days, though the service itself had not been breached and…
-

How to Keep Devices Secure When Traveling
Travel is a common aspect of business, especially those businesses or firms with employees working in remote locations, or those serving a distributed client base. As personnel will be scattered, using multiple different networks and devices rather than a singular secure network, businesses everywhere have been adapting to these new environments in order to keep…
-

Why Network Firewall Security is Important
A firewall can take the form of computer hardware or software, and is used to protect a firm’s network. Network firewall security is the intermediary between your network and external parties. Through firewall’s ability to track and monitor breaches or potential breaches, as well as its ability to filter out unwanted external traffic, they are…
-

How to Spot Phishing Emails
As a part of any firm’s cybersecurity plan, defenses against phishing attacks are a necessity. Phishing is a common tactic used by cybercriminals in attempts to steal the private information of businesses or individuals. Over the years, phishing scams have not only increased in numbers but in complexity as well. The difference between upholding your…
-

CISO Mag: We’ll See More Data Exfiltration and Data Leak Threats
Drawbridge CISO Simon Eyre shares a dire warning on the increasing risk for certain kinds of damaging cyber attacks.




