Hedge Fund Technology Selection
Read on to learn how you can maximize your space for the best technology performance, and how to ensure that your office space works with your desired technology set up.
The Socially Engineered Threat
Social engineering is a cyber attack strategy hedge funds must be aware of. These threats encompass a wide variety of attack strategies, and rely on manipulating …
Four Steps to Protecting Data
While nobody wants to imagine that they will be the victim of a data breach, it’s important to prepare in the case that one occurs. Here are four simple steps t …
How Will MiFID II Change Data?
Managing Director of RFA George Ralph discusses the technological implications of Mifid II with HFM Week.
How to Prevent Against Common Cyber Threats
Today, learn about two common cyber threats how to prevent them.
Concentration Risk
Any business faces some form of concentration risk but for hedge funds there is a plethora of different concentrations on the technology side posing potentially s …
Data Protection Best Practices
Ensuring data stays protected requires a well planned strategy, and begins with your employees. While you can’t completely mitigate the risk of human error, the …
What are the Implications of MiFID II?
In December 2014, the draft of MiFID II technical standards was published, by arming investors with more information, the regulations hope to allow investors to m …
Multi-tenant and Shared Directory vs. Risk
Recent research by the Cloud Industry Forum identified that 63% of respondents from the public and private sectors envisioned moving their entire IT infrastructur …
Recap: Aston Martin Showroom Event
On Thursday, March 3rd, we hosted 100 guests for a successful networking event with eSentire and Stabb Office Interiors at the Aston Martin Showroom in Mayfair, L …