You've requested...

Share this with your colleagues:

Industry Intelligence: International Financial Reporting Standards for Hedge Funds

If a new window did not open, click here to view this asset.

Download this next:

AppSec guide: Complying with new NIST & RASP requirements

Recently, the National Institute of Standards and Technology (NIST) released a new set of guidelines and standards related to application security (AppSec). The revisions include requirements such as:

  • Employing interactive application security testing [IAST] to identify flaws & document results
  • Implementing RASP to reduce the exposure of software to attacks by monitoring, controlling, and blocking access

In this white paper, take a closer look at the new requirements, what their implications will be, and 4 key steps organizations should take to ensure compliance.

These are also closely related to: "Industry Intelligence: International Financial Reporting Standards for Hedge Funds"

  • NIST's application security revisions: What you need to know

    The National Institute of Standards and Technology (NIST) provides organizations with standards for various aspects of cybersecurity to drive worldwide industry security compliance.

    Recently, NIST released a new set of guidelines surrounding application security. This landing page provides easy access to several multimedia resources that contain useful information regarding application security, including:

    • Webcast: NIST Application Security Revisions You Need to Know
    • Whitepaper: A Modern Application Security Handbook
    • Podcast: Inside AppSec

  • Third-party OAuth apps: A guide

    For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications.

    What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps, emphasizing the importance of:

    • Discovering
    • Monitoring
    • Protecting
    • Educating

Find more content like what you just read:

  • Mobile threats: 12 reasons why you need stronger app security

    Whether it’s for internal communication, enhancing customer experience or part of a digital transformation initiative, mobile applications play a critical role and ensuring their protection is paramount. Download this infographic to discover 12 reasons why organizations need stronger mobile app security strategies.

    Download

  • The software security crisis up close

    We’re in a software security crisis—and we have been for a while now. In both 2000 and 2019, applications had an average of 26.7 serious vulnerabilities. This webinar examines the state of application security and considers how strong instrumentation-based application security platforms are key to finally uniting development and security.

    Download

  • How to Protect Against the OWASP Top 10 and Beyond

    IT executives, contributors, and IT security teams in a range of industries understand that their growing arrays of public-facing applications, whether those are web, mobile, or API-based, are the targets of automated bot attack campaigns.

    Download

  • The top 4 challenges for application security

    According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.

    Download

  • The state of software security: Research report

    For the last decade, Veracode has been conducting studies and releasing annual reports regarding the current trends and challenges within software security. In this year’s edition, examine key statistics surrounding trending themes like compliance, security debt, scanning for flaws, and more. Read on to unlock the full report.

    Download

  • Finance for IT decision makers: Making business cases

    This extract from Michael Blackstaff's book, Finance for IT decision makers, teaches you how to make effective business and financial cases for IT projects.

    Download

  • Procurement & supply chain priorities for BFSI companies post-COVID-19

    Download this white paper to examine the crucial role that the procurement and supply chain functions should play in helping the financial services sector successfully navigate the weeks and months ahead.

    Download

  • How to fill manufacturing’s skills gap amidst the pandemic

    With the onset of the pandemic, manufacturers did a 180, instead placing even more value into larger workforces. Now, manufacturers must face the challenges of a larger workforce: filling in the skills gap. Learn how people (and skillsets) will power manufacturing’s future in this guide.

    Download

  • How to tackle internet filtering and reporting

    In an environment where access to a secure computing device is governed and controlled by inherently secure protocols, the problem still remains of how access to untrusted environments such as the Web is controlled.

    Download

  • How a global courier prevented account takeovers & fraudulent account creation

    A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.

    Download

  • Technology value matrix : ERP

    Analyst group Nucleus Research looks at the latest trends in enterprise resource planning (ERP) and discusses the best performing suppliers.

    Download

  • Getting Started with CASB

    Migrating your business to the cloud can increase business agility, flexibility and efficiency. But it also changes your cybersecurity. Without a perimeter, sensitive data can be shared without oversight. And cyber criminals can compromise user accounts to steal funds and data. Read this white paper to learn 4 reasons you should consider a CASB.

    Download

  • Banking on digital risk: Staying safe amid DX

    The financial services industry is experiencing challenges across multiple areas amid DX. Find out how to simplify the transformation process with TIBCO and their analytics, data management/operations, and connectivity capabilities in this white paper.

    Download

  • Presentation Transcript: Platform-as-a-Service Changes Everything, Again! Visual PaaS is Here!

    Sophisticated Visual PaaS offerings provide a unified environment that empowers both "hard-core programmers" as well as “citizen developers” to develop business applications. CIOs are seeing PaaS as a viable option to embrace "citizen developers" and make the transition from Information Technology to Business Technology.

    Download

  • Mergers and acquisitions: How Tanium can help organizations reduce risk

    The mergers and acquisitions outlook continues to show strong growth. However, acquiring companies face a long list of risks that must be assessed and carefully accounted for during due diligence. In this brief, learn how Tanium can help organizations accelerate the due diligence process and reduce risk.

    Download

  • Cloud enabling the banking industry

    This report explores how the banking industry architecture network (Bian) service landscape may be used to define a comprehensive commercial blueprint that could be used to cloud-enable the banking industry.

    Download

  • Streamline and improve your financial cycle by using your data better

    Financial leaders have a lot to gain by making informed, data-driven decisions. Unfortunately, many financial leaders are left constructing historical tales with their data—not driving innovation that will improve tomorrow’s bottom line. Read on to learn how you can become a data-driven finance leader, using data to predict rather than react.

    Download

  • World Bank banks infrastructure consolidation savings

    The World Bank needed a highly efficient, secure data center infrastructure to keep its worldwide efforts afloat – and in order to allocate more resources towards its core mission. Read into this case study to learn how the World Bank achieved its data center infrastructure goals.

    Download

  • Privileged Account Management for Dummies

    In this e-book, Privileged Account Management for Dummies, discover a comprehensive overview of what they are, where they reside, their functionality and the potential risks. Read on to enhance your understanding of privileged account management (PAM).

    Download

  • CW+: Analyst's take: Cyber-Ark benefits privileged account management

    Managing privileged accounts requires balancing accessibility and control while ensuring audit capabilities.  Cyber-Ark enables organizations to increase administrator productivity while reducing risk.

    Download

  • How to build a successful ABM foundation with data-driven account selection

    In this white paper, learn how to build a successful ABM foundation with data-driven account selection and modeling. Explore 4 signs your company is failing with ABM account selection, and discover how to match your account selection with active demand in your market.

    Download

  • AI in finance: 5 ways you can transform data capture

    Accounts payable practitioners surveyed for the Institute of Finance and Management’s (IOFM) recent “Future of Accounts Payable Study” rank AI among the most important technologies to the future of their profession over the next 3 years. Download this white paper for 5 ways that accounts payable can benefit from data capture solutions that use AI.

    Download

  • Key benefits of Hitachi ID Privileged Access Manager

    In this product overview, learn about the Hitachi ID Privileged Access Manager and how it can secure access to high risk accounts and groups, replace static, shared passwords with periodically changing random values, and much more.

    Download

  • How to drive sales and marketing activities with ABM scoring

    Download this white paper to examine common models and insight on what qualification criteria to focus on in determining your own ideal approach to ABM scoring.

    Download

  • How high-performance networks drive K-12 digital learning

    In this white paper, discover use cases coming to the forefront for K-12 educational and administrative requirements, the vital role high performance networks play in driving those applications and what to look for in identifying high-performance networking solutions and a technology partner for your next E-Rate funding proposal.

    Download

  • Building your privileged access management (PAM) policy

    In order to protect privileged accounts against misuse, organizations are establishing privileged access management (PAM) policies. The following guide highlights a 10-step process for customizing a PAM policy template, designed to help your team build a policy based around your unique security and compliance requirements.

    Download

  • Use purchase intent to refocus ABM priorities

    This new e-book discusses how to implement data-driven strategies to maximize ABM performance in today's rapidly changing business environment. Download your copy here.

    Download

  • Speed up your close times and get better reporting

    For many companies, financial reporting accuracy and speed lags far behind what they’d like to see. But why is that? Slow processes, errors during data entry, and non-compliant reporting processes can all impact your reporting—and your close speeds. Check out this eBook to see how to drive a faster close and better reporting.

    Download

  • How to transform and automate accounts payable: 3 steps

    Access this custom white paper to examine 3 benefits of automating accounts payable and learn 7 key questions to ask about a future-proofed solution.

    Download

  • Email security threats – have you experienced spear phishing?

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

    Download

  • How to use purchase intent data during turbulent times

    Open this white paper to learn how to embrace real purchase intent and make agile changes to account lists and resources to reach your target market faster and easier.

    Download

  • Real-time password synchronization with Hitachi ID Privileged Access Manager

    In this resource, discover all of the key benefits and capabilities of Hitachi ID's Privileged Access Manager.

    Download

  • Automating AP: 4 ways shared services organizations can benefit

    Download this white paper to learn about 4 major ways shared services organizations can extend the value of ERP investments with accounts payable automation.

    Download

  • Credential stuffing and account takeover at Starbucks

    Starbucks' Director of InfoSec, Mike Hughes, joins the CEO of Shape Security for a conversation regarding the challenges of credential stuffing and account takeover at Starbucks and the industry at large. Tune in to hear about Starbuck's success with Shape Security's Blackfish.

    Download

  • 3 ways to combat lateral phishing

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

    Download

  • July 15, 2020: The biggest Twitter attack

    On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.

    Download

  • 6 benefits of RPA for finance and accounting

    Access this ebook to learn RPA use cases in finance and accounting, insights from actual users on what constitutes an effective EPA platform, 6 benefits of implementing RPA, and much more.

    Download

  • How to free up the accounts payable workload for unique business intelligence

    Read this white paper to learn why unique accounts payable business intelligence is being missed out on due to poorly optimized workloads—and how to work around this.

    Download

  • How attackers target individuals and monetize successful ATOs

    Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.

    Download

  • G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy

    The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.

    Download

  • Protection against bot attacks: BotRx data sheet

    For eCommerce organizations, the increasing use of web and mobile apps present a potentially lucrative vector for hackers. In fact, nearly half of online traffic on eCommerce sites is malicious bots – so what can organizations do to protect against these threats? Read this data sheet to learn about how BotRx is helping their users.

    Download

  • Email security awareness training

    It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

    Download

  • How to reduce journal entry bottlenecks in SAP

    Learn how to reduce key bottlenecks, so you can quickly produce better, more accurate financial reports with Winshuttle in this webinar.

    Download

  • Nordics' IT leaders facing the coronavirus crisis

    In this e-guide we look at some of the innovations, in the region, that are addressing Covid-19 challenges. But we also feature news that many tech startups in the region might soon face problems innovating at all as investment funds dry up.

    Download

  • Accelerate app performance for Office 365

    This brief examines Apcela's Office 365 Accelerator and how it supports SaaS connectivity and performance for apps like Office 365. Find out how the Office 365 Accelerator enables low latency, traceability, and app performance visibility.

    Download

  • 57-page guide: Privileged access management 101

    Download this white paper to learn more about the best practices for processes, policies and technology used to secure access to privileged accounts and other elevated privileges.

    Download

  • AP automation provides key visibility into operational controls

    In this Institute of Finance and Management (IOFM) white paper, dive in to discover how automation is poised to drive operational improvement for accounts payable (AP) departments.

    Download

  • The most commonly used attack tool for credential stuffing

    Sentry MBA is an automated attack tool used by cybercriminals to take over user accounts on major websites. In this brief, gain a better understanding of how Sentry MBA works to help you defend against credential stuffing attacks.

    Download

  • Credential stuffing attackers target US telecom provider: Case study

    A Top 3 US Telecom Provider needed to secure its mobile accounts from credential stuffing attackers targeting them to commit various fraud schemes. In this case study, learn how the company was able to stop upgrade theft, 2FA bypass, and virtual calling with Shape Enterprise Defense.

    Download

  • How phone-number verification beats back fraud

    Access this e-book to learn how fraud is typically committed, what businesses are doing about it, and how phone-number verification can help stem losses caused by widespread fraud.

    Download

  • Your ultimate guide to bots: Evolving threats & management tactics

    Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.

    Download

  • Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

    In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.

    Download

  • Aligning Enterprise Identity and Access Management with CIO Priorities

    In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

    Download

  • Email phishing security: IRONSCALES vs Office 365's ATP

    Email phishing attack detection and response is one of the biggest challenges security teams face today, representing 93% of breaches. In this white paper, compare Office 365’s Advanced Threat Protection to IRONSCALES Advanced Email Threat Protection and see how they stack up against today’s email threats.

    Download

  • Think like an attacker: Prevent and respond to security breaches

    Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.

    Download