Remove Definition Remove Management Remove Operations Remove Security
article thumbnail

U.S. Regulations to Consider When Managing a Cryptocurrency Fund

Perficient

However, in this blog, we will discuss the regulatory landscape surrounding cryptocurrency from an asset manager or fund manager perspective. We’ll then move to the federal level, seeking regulatory guidance as to whether digital tokens are securities under the jurisdiction of the U.S. Central Bank Digital Currency (CBDC) ).

article thumbnail

New Microsoft Security and Compliance Certifications (Feb 2021)

Perficient

This morning I was sipping on my cup of coffee and browsing through Microsoft’s Learn page when I stumbled upon a few new certifications and exams around Microsoft Security and Compliance ! Certification – Microsoft Certified: Security Operations Analyst Associate. Implementing access management for apps.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two Perficient Colleagues Quoted in Forrester Report on Emerging Insurance Technologies

Perficient

Insurers are constantly striving to improve their operations, provide better experiences for customers, and minimize risks. Monica Gernert, a project manager, and insurance expert at Perficient, provided a critical perspective around genAI that’s quoted in the report.

article thumbnail

New Year’s Resolution: The Clearing House Urges Banks To Become 24/7 Operations

PYMNTS

To do that, and to clear the next hurdle, Whisler said many financial institutions (FIs) still need to “modernize internally to be a 24/7 operation shop.”. One thing is customer service, but the other is liquidity management or cash flow forecasting, and that's new to a lot of organizations.”.

article thumbnail

When and by Whom Should TRACE Transactions Be Reported? (Part 4 of 6)

Perficient

All broker-dealers who are FINRA member firms have an obligation to report transactions in TRACE-eligible securities under an SEC-approved set of rules. This includes implementing and operating computer systems that commence the trade reporting process at the time of execution without delay.

Report 294
article thumbnail

Hacker Attack Exploits Security Hole In Token Exchange

PYMNTS

A cyberattack on what’s been described as a “decentralized” token exchange reportedly has led to a $58,000 theft and an illustration of a “shocking security vulnerability.”. Newdex later revealed the attackers managed to siphon 4,028 real EOS (approximately $20,000) to cryptocurrency exchange desk Bitfinex.

Security 186
article thumbnail

Customer Identity Management Is NOT the Same as Access Control

FICO

Customer identity management is a term that is subject to a number of definitions. The goal of CIM is to meet regulatory rules and legislation, prevent fraud and financial crime, and manage risk—all while making it simple for customers to transact. Customer identity management operates today in an unpredictable environment.