Subscribe

Social Media Links

Featured Insights

Filters

Most Recent

When the Cyber Attack Hits: What to Do, What Goes Wrong, and How Insurance Really Works

When a cyber incident occurs, most organizations quickly discover the hard truth: No one is fully prepared for what happens next. Decisions made in the first hours and days of an attack can significantly impact business interruption losses, insurance recovery, and long-term financial exposure.

Privacy Engineering in 2026: Consent Logs, Retention Automation, and Erasure Reality

As organizations move from Digital Personal Data Protection (DPDP) awareness to DPDP execution, the biggest risk is treating compliance as a documentation exercise. In 2026, the winning approach is simple: Turn DPDP obligations into engineering controls you can prove. 

Ankura CTIX FLASH Update – April 28, 2026

Malware Activity When Trust and Infrastructure Become the Attack Surface Deepfake voice fraud and persistent firewall malware highlight how modern cyberattacks are increasingly designed to bypass traditional security controls by targeting trust and core infrastructure instead. Attackers are now convincingly impersonating executives using AI‑generated voices and video, pressuring employees into approving high‑value transactions through what ...

Construction Schedules: Why Owners Should Monitor and Care

Construction schedules take many forms, ranging from simple bar or Gantt charts to fully developed Critical Path Method (CPM) schedules prepared using tools such as Primavera P6 or Microsoft Project. Regardless of format, initially the schedule is intended to represent how the contractor plans to execute the work, but it can also be used to measure and evaluate delays and changes in the work.

AI in Forensic Investigations: Why Offline LLMs Are the Way Forward

Imagine this: A senior partner at a global law firm is sitting with a forensic team, discussing a high-stakes investigation. There are millions of documents to review, timelines are tight, and regulatory pressure is building. Using artificial intelligence (AI) for the initial review seems like the obvious, practical choice.

Not Yet, AI… Not Yet

I have always been a lover of technology. By DNA, I am an early adopter. Back in the 80s, I was the first person I knew to own a CD player; 20 years later, I was the first with an MP3 player. I had digital fingerprint locks on my doors before they were a hardware-store staple, and I was carrying a Canon ELPH digital camera and printing at home when most people were still dropping off rolls of film at the pharmacy.

Ankura CTIX FLASH Update – April 24, 2026

Malware Activity When Old Devices and Destructive Malware Become WeaponsA series of recent cyber incidents highlight two growing and related risks: neglected network hardware and destructive malware aimed at disruption rather than profit. In one campaign, a Mirai botnet has been actively exploiting a known flaw in discontinued D‑Link routers, allowing attackers to remotely install malware and quietly turn these outdated devices into tools for large‑scale denial‑of‑service attacks. Although the vulnerability was disclosed more than a year ago, many of these routers remain in use despite no longer receiving security updates, making them easy targets. In a separate but equally ...

The Performance Playbook: Rapidly Scaling Revenue Through Digital

What if the real threat to growth right now is not the market — but the response to it? Matt Sgrignari, Ankura Performance Improvement expert, unpacks how organizations can drive sustainable revenue in today’s turbulent financial climate.

CyberView™ Case Study — Enabling Portfolio-Wide Cyber Risk Visibility for a Global Private Equity Firm

Discover how a global private equity firm addressed a lack of portfolio wide visibility into cybersecurity risk by implementing CyberView™ as a standardized assessment and reporting capability. By establishing a common controls baseline and centralized reporting model, the firm gained consistent, defensible insight into cyber maturity and risk across its portfolio.

Putting AI to the Test: How 5 Tools Performed Across 3 Financial Models

Every finance team is being asked the same question: Should we be using AI to build our models? The Ankura OCFO® team ran identical prompts through Claude for Excel, M365 Copilot (Agent Mode), ChatGPT in Excel, Shortcut (Free Tier - Open SourceModel), and Shortcut (Pro Tier) against a fictional company (Fieldstone Retail Holdings, approximately $180 million revenue, three entities).

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with