Subscribe

Social Media Links

Featured Insights

Filters

Most Recent

The Impact Exchange | The New PE Playbook: Finding Value in Fragmented Markets

In a market where private equity (PE) is searching for its next growth engine, where does real value actually come from? The answer may surprise you.

UAE Trends and Developments: The 2026 Cyber Horizon

The United Arab Emirates’ (UAE’s) cyber risk landscape is intensifying as artificial intelligence (AI) adoption, digital transformation, and legacy technology exposure converge with heightened regulatory scrutiny — expanding the country’s attack surface and increasing organizational accountability.

Ankura CTIX FLASH Update – April 3, 2026

Malware Activity How Attackers Are Weaponizing App Stores and Messaging AppsRecent investigations highlight a troubling trend in which attackers are abusing trusted platforms to quietly compromise both mobile and desktop devices at scale. On Android, a sophisticated malware known as NoVoice was distributed through the official Google Play Store, hidden inside legitimate‑looking apps that infected over 2.3 million devices before being removed. These apps worked as advertised and raised no immediate red flags yet exploited outdated Android security flaws to gain deep system access and embed themselves so thoroughly that even factory resets may not fully remove them. At the ...

Managing Claims and Avoiding Conflict Through Documentation, Communication, and Early Action

Ankura’s Thomas Certo recently shared insights during a panel discussion at the Canadian Institute’s 18th Annual Conference on Navigating Risk in Construction Projects & Contracts, West, held in Calgary. The panel brought together legal and advisory professionals to discuss delays and damages, and to share practical strategies for managing claims and avoiding conflict.

Contract Risk in Focus: Enhancing Project Success Through Proactive Communication

Construction projects are inherently complex, multidisciplinary, and high‑risk. While contracts are designed to allocate responsibility and manage uncertainty, disputes often arise not from the contract language itself, but from how teams communicate across the project lifecycle.

Reclaiming Store Labor: Put Hours Back on the Sales Floor

Retailers are not short on labor effort — they are short on productive, customer-facing time. Over the last decade, store operations have absorbed growing complexity: tighter delivery windows, more frequent price changes, more frequent resets to keep up with product trends, omnichannel fulfillment, promotional churn, and exception-driven work that pulls associates off the floor at exactly the wrong moments.

Ankura CTIX FLASH Update – April 1, 2026

Malware Activity How Social Engineering and Supply‑Chain Threats Are Targeting macOS and DevelopersRecent security research highlights a growing wave of attacks that rely on deception and trust, rather than traditional software vulnerabilities, to compromise macOS users and developers. One campaign, known as Infinity (or Infiniti) Stealer, uses fake Cloudflare‑style CAPTCHA pages to trick Mac users ...

Defective Specifications: Causation, Impact, Prevention, and the Architect’s Standard of Care

Construction specifications translate design intent into enforceable requirements governing procurement, construction execution, quality control, and contract administration.

From Waste to Control: Using SAM to Protect Your 2026 Budget

As we enter the 2026 fiscal planning peak, organizations need to shift their focus from simple license compliance to strategic cost recovery. With March and April marking the finalization of yearly budgets for many enterprises, Software Asset Management (SAM) has evolved into a critical financial lever for protecting margins and reclaiming wasted spend.

Ankura CTIX FLASH Update – March 27, 2026

Malware Activity Ghost Campaign Abuses npm Install Process to Deliver Stealthy Crypto-Stealing Malware A newly identified supply chain attack campaign, dubbed the “Ghost campaign” by ReversingLabs, leverages malicious npm packages that mimic legitimate installation activity to covertly deploy malware targeting sensitive data and cryptocurrency wallets. First observed in early February 2026, the campaign uses deceptive ...

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with