ACA Spotlight Blog

GRC Spotlight Blog

Cybersecurity

Insights and guidance from ACA's team of experienced compliance and technology professionals.

Categories
Critical Vulnerability Discovered in Internet Explorer
April 18, 2019

On April 10, researchers published information on a critical vulnerability in Microsoft’s Internet Explorer® (IE) browser.

Vulnerabilities Discovered in VPN Applications
April 12, 2019

On April 11, researchers from the Carnegie Mellon Software Institute announced security vulnerabilities in multiple virtual private network (VPN) applications.

Vulnerabilities Discovered in Verizon Fios Routers Affecting Millions
April 10, 2019

On April 9, researchers discovered three serious vulnerabilities in the Verizon Fios Quantum™ Gateway (G1100) router.

SEC Updates Document Request List for Cybersecurity Examinations
April 9, 2019

The SEC's OCIE recently updated their document request list for cybersecurity examinations. Find out what's new in the document request list and how your firm should prepare for a cyber examination. 

SEC OCIE To Launch Cybersecurity Initiative Focused on M&A
March 27, 2019

Missed the 2019 Mutual Fund and Investment Management Conference? ACA's Jim Pappas shares his observations from the keynote session which featured a speaker from the SEC. 

Why Financial Services Firms Must Prepare for the California Consumer Privacy Act
March 25, 2019

ACA's Alex Scheinman discusses why financial services firms should prepare for CCPA compliance and develop a compliance roadmap.

March 13, 2019

How are financial services firms addressing cybersecurity risks? We recently surveyed 210 firms in partnership with NSCP to find out.

January 31, 2019

Tax season is a prime time for identify theft. Find out how you can avoid common tax scams.

January 30, 2019

Is your firm prepared for the SEC's new cyber focus areas for 2019? Find out what your firm needs to know, and what you can do to prepare.

5 Cybersecurity Trends to Watch Out for in 2019
January 4, 2019

What are the top five cybersecurity trends your company should prepare for in 2019?

Third-Party Risk Management: DIY
December 14, 2018

Performing third-party risk management (TPRM) on vendors is a complex, high-stakes process. So how do you decide what is the right solution for your company? Here are 5 key differences to help you determine whether process automation or process outsourcing is best for your company.