Remove Definition Remove Operations Remove Security Remove Technology
article thumbnail

Two Perficient Colleagues Quoted in Forrester Report on Emerging Insurance Technologies

Perficient

Insurers are constantly striving to improve their operations, provide better experiences for customers, and minimize risks. ” Brian Bell, Perficient’s Insurance Principal, who was also quoted in the report, highlights the significance of another emerging technology: critical event intelligence.

article thumbnail

When and by Whom Should TRACE Transactions Be Reported? (Part 4 of 6)

Perficient

All broker-dealers who are FINRA member firms have an obligation to report transactions in TRACE-eligible securities under an SEC-approved set of rules. This includes implementing and operating computer systems that commence the trade reporting process at the time of execution without delay.

Report 294
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hacker Attack Exploits Security Hole In Token Exchange

PYMNTS

A cyberattack on what’s been described as a “decentralized” token exchange reportedly has led to a $58,000 theft and an illustration of a “shocking security vulnerability.”. The EOS network recently took the top spot in an evaluation of blockchain networks by China’s Ministry of Industry and Information Technology (MIIT), CoinDesk reported.

Security 186
article thumbnail

Chef’d Halts Operations After Burning Through Cash

PYMNTS

Chef’d , a the meal-kit operator, has halted its business operations after using up all its cash and failing to line up more of it. Executives tried to secure new funding from private investors and banks, but nothing came of the negotiations. They are definitely having growing pains,” he said. “It

article thumbnail

Nationwide Study: SMB Owners Lax About IoT Security Risk

PYMNTS

The Nationwide fourth annual business owner survey released at the end of last month, which surveyed 1,000 small and mid-sized business owners about their views on cybersecurity, found that an overwhelming majority – 91 percent – use connected technology. Automation also provides the ability to aggregate data.

Study 191
article thumbnail

U.S. Regulations to Consider When Managing a Cryptocurrency Fund

Perficient

We’ll then move to the federal level, seeking regulatory guidance as to whether digital tokens are securities under the jurisdiction of the U.S. Securities and Exchange Commission (SEC) or commodities contracts over which the Commodity Futures Trading Commission (CFTC) has regulatory jurisdiction. State Regulations.

article thumbnail

How Homesharing Platform Spotahome Mitigates Data Security Concerns

PYMNTS

Homesharing platforms must make more traditional rental assurances and double down on user verification if they want to stay compliant, said Hugo Monteiro, co-founder and technology advisor for homesharing platform Spotahome. Security and the Homesharing Platform. The less [user] information we store, the better.

Security 100