Cybersecurity and Risk Insights and Alerts

Cyber risks and threats continue to evolve, and firms are under pressure to meet SEC and FCA expectations for operational resilience as well as their own internal and client expectations for cybersecurity and privacy. Stay current on the latest cybersecurity, privacy, and risk threat and regulatory alerts, and build your cybersecurity and privacy knowledge with insights from our cybersecurity and technology risk experts.

ACA Aponix Cybersecurity Checklist

Download and review the following cybersecurity safeguards and evaluate your firm’s cybersecurity program.

Cyber alerts and insights

lock

Merger and Acquisition Platform Datasite Named as a Victim of MOVEit Breach

Datasite, which provides a data sharing platform and encrypted data rooms for potential merger and acquisition partners, is the latest victim of the MOVEit Breach.

Cyber Alert
  • Cybersecurity
meta person

Myths About Cybersecurity Portfolio Oversight: Myth #2

Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
lock

Fortinet releases security advisory for critical heap-based overflow vulnerability

Fortinet's June 12th advisory warns of a critical vulnerability (CVE-2023-27997) rated 9.8/10 by NIST. FortiOS and FortiProxy SSL-VPN users are at risk of system access by hackers.

Article
  • Cybersecurity
meta person

Myths About Cybersecurity Portfolio Oversight: Myth #1

Cyber threats are on the rise, making robust cybersecurity oversight essential for protecting investments. We debunk a common myth about portfolio oversight.

Article
  • Cybersecurity Resources
  • Cybersecurity
  • Portfolio Company Risk Management
abstract image with a lock and shield

Critical MOVEit Transfer Vulnerability Updates

Progress Software discovered a critical SQL injection vulnerability (CVE-2023-34362) on May 31st in the MOVEit Transfer software which allowed unauthorized access to the Transfer environment and escalated privileges.

Cyber Alert
  • Cybersecurity
streaks

13 Key Elements for Successful Cybersecurity Portfolio Oversight

Our cyber team has identified the key elements of successful programmatic cyber oversight. By adopting these elements, firms can avoid value destruction, meet investor expectations, and increase valuations of their portfolio.

Article
  • Cybersecurity
  • Cybersecurity Resources
  • Portfolio Company Risk Management