From the world of b-next

How do you solve the compliance puzzle?

How do you solve the compliance puzzle? In a post-pandemic world, economic and geopolitical change, banking crises, cyber threats and volatile crypto markets, represent an ongoing challenge for compliance officers. Regulators including the US Securities and Exchange Commission (SEC) and the UK Financial Conduct Authority (FCA), are responding to this changing environment with increased regulatory […]

read more

b-next Demonstrates Commitment to Excellence with ISO 27001 Certification

Herford, August 15th 2023 – b-next, a specialist Capital Markets Trading Surveillance and Compliance solution provider, proudly announces its recent achievement of becoming a certified ISO 27001 company, marking a significant milestone in the realm of information security management. This certification underscores b-next’s unwavering dedication to upholding the highest standards in safeguarding valuable data and […]

read more

Adverse Media Screening (von Wolfgang Fabisch)

Vor vielen Jahren, als ich noch bei Reuters tätig war (lang, lang ist es her), kam der Marketingleiter zu mir: “Herr Fabisch, es wäre doch schrecklich, wenn in den Medien stünde, unsere Kekse machten impotent. Und ich wäre der Letzte, der davon erführe.” Das Problem war damit hinreichend und klar beschrieben. Er wollte überwachen, was […]

read more

Adverse Media Screening (by Wolfgang Fabisch)

Many years ago, when I was still working at Reuters, long, long ago, the marketing manager came to me. Mr. Fabisch, it would be terrible if the media said our cookies made people impotent and I was the last to know about it. That was a clear and sufficient description of the problem. He wanted […]

read more

Cyber Crime – Cyber Security

No matter what size your company is, no matter what industry, no matter what countries you operate in: Your company is the target of cyber criminals. The compliance office in particular is often a worthwhile target for attack, especially in the financial industry. A wealth of internal and external data flows together here, e.g. in […]

read more

SUBSCRIBE TO OUR NEWSLETTER