Skip to content

How the SolarWinds Cybersecurity Breach Weaponized a Software Designed to Protect Us

How did a “supply chain attack” breach and weaponize SolarWinds? In late 2019, perpetrators of one of the most pervasive cyber attacks in history gained access to SolarWinds systems. The hackers ...
Filter By
Clear Search

Category Path 7




White Paper

Exiger WINs


The ExCo Vs The Status Quo

My Ex2


Case Studies

topic Path 7


AI-Powered E-Discovery

AI-Powered Technology

Audit & Assurance


Corporate Legal & Compliance

Diligence for ICV

Exiger WINs

FI Compliance



Investment & Fundraising Teams

Managed Services

Model Validation

My Ex2

Pre Investment & IPO

Press Mention

Press Release

Program Design Review & Training

Public Sector

Remediations & Lookbacks

Residency & Citizenship by Investment Programs

Risk & Operations

Supply Chain Risk Management


Third Party Risk Management

Tuning & Optimization

White Paper

Exiger Discusses Big Bank Data and Risk Assessments

How the SolarWinds Cybersecurity Breach Weaponized a Software Designed to Protect Us

Exiger Celebrates International Women's Day

Client Alert: The Anti-Money Laundering Act of 2020

The Role of Compliance in Protecting Our People & Communities

Evolving from a Check-the-Box Function to a Culture of Compliance

My Exiger Experience: Rishika Lama Tamang

My Exiger Experience: Harshita Ahuja

Preparing the U.S. Bulk Power Supply for the Next Generation of Threats

Brendan Galla Named 'Top 25 RegTech Executive 2021'

Leveraging Global Challenges to Accelerate the Impact of Compliance

Fortune 500 Multinational Corporation

Building Resilience in a Time of Unprecedented Change

The Case for Regular Look Backs in the RCBI Compliance Framework

Why You Should Consider Adding Model Validation Results to Your AML and Sanctions Risk Assessments

Exiger Provides Due Diligence for Transparency International's 2020 Anti-Corruption Award