Subscribe

Social Media Links

Featured Insights

Filters

Most Recent

Putting AI to the Test: How 5 Tools Performed Across 3 Financial Models

Every finance team is being asked the same question: Should we be using AI to build our models? The Ankura OCFO® team ran identical prompts through Claude for Excel, M365 Copilot (Agent Mode), ChatGPT in Excel, Shortcut (Free Tier - Open SourceModel), and Shortcut (Pro Tier) against a fictional company (Fieldstone Retail Holdings, approximately $180 million revenue, three entities).

Regional Disruption, Force Majeure, and Delay Analysis: Preserving Program Integrity and Project Records

Recent geopolitical instability in the Middle East has created a landscape of uncertainty that will likely affect logistics, supply chains, and the delivery of construction and infrastructure projects across the region.

India’s Economic Odyssey 2026: Navigating New Frontiers of Growth and Innovation

India’s Economic Odyssey 2026 is Ankura’s in‑depth analysis of India’s economic outlook, policy environment, and sectoral opportunities as the country enters its next phase of growth. As the world’s fastest‑growing major economy in 2026, India continues to attract global investment and strategic attention.

Post‑Acquisition TSA Analytics Platform

Following a healthcare technology acquisition, the private equity sponsor inherited a complex set of transition services agreements (TSAs), covering critical operational and financial services. The buyer needed immediate visibility into TSA status, changes to service scope, and the financial implications of those changes across a multiyear-transition period.

Medicare Proposes 2.4% Hospital Reimbursement Increase

On April 10, 2026, the Centers for Medicare & Medicaid Services (CMS) released the fiscal year (FY) 2027 Hospital Inpatient Prospective Payment System (IPPS) and Long-Term Care Hospital (LTCH) Prospective Payment System Proposed Rule.

Ankura CTIX FLASH Update – April 21, 2026

Malware Activity From Ransomware to AI: Why Trust Is the New Target Recent reporting highlights a shared theme across both ransomware operations and attacks on artificial intelligence: attackers are increasingly exploiting trusted systems rather than breaking them. The Payouts King ransomware group demonstrates this by abusing QEMU, a legitimate virtualization tool, to quietly run hidden ...

The Only Covenant That Counts

While the $1.7 trillion private credit market is experiencing its first real stress test, the focus has been on fund-level liquidity and investor redemptions. What matters most, though, is the health of the underlying borrowers. And there is nothing more critical to measuring a company’s health and ability to repay debt than its cash flow.

Continuous Network Design: The Transformational Key to Resilient, Adaptive Supply Chains — A Three-Part Series

Today’s global businesses operate in an increasingly complex environment influenced by multiple forces. Labor challenges, geopolitical risks, shifting trade policies, evolving supplier and customer dynamics, changes in manufacturing footprints, and rapid advances in technology all pose potential threats to the stability and performance of supply chain networks.

Use of Expert Determination as an ADR Method

Alternate Dispute Resolution (ADR) mechanisms are generally designed to deliver time and cost efficiency, procedural flexibility, and confidentiality. However, one key consideration that is often understated is the degree of confidence the chosen ADR method can provide in achieving a fair and reasonable outcome. Many dispute resolution specialists have experienced utterly unexpected results — outcomes that far exceed their worst- or best-case scenarios. This can sometimes be a function of the ADR mechanism selected.

Ankura CTIX FLASH Update – April 17, 2026

Malware Activity When Trust Becomes the Attack Surface Two (2) recent campaigns highlight a growing shift in cybercrime where attackers exploit trusted platforms and everyday user actions, rather than software flaws, to cause harm. In one (1) case, threat actors abused the popular note‑taking app Obsidian by posing as venture capital investors and convincing finance ...

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with