The leading knowledge platform for the financial technology industry
The leading knowledge platform for the financial technology industry

A-Team Insight Briefs

Moody’s Completes Acquisition of Credit Data Provider Cortera

Moody’s has completed its acquisition of Cortera, a provider of North American credit data and workflow solutions. The acquisition enhances the company’s risk assessment capabilities and extends its coverage in the small and medium enterprise segment. Cortera also augments Moody’s Orbis database of private company information – acquired along with Bureau van Dijk in 2017 – and enhances its KYC, commercial lending, and supply chain solutions.

Related content

WEBINAR

Recorded Webinar: Brexit: Reviewing the regulatory landscape and the data management response

With Brexit behind us and the UK establishing its own regulatory regime having failed to reach equivalence with the EU, financial firms face challenges of double reporting, uncertainty about UK regulation, and a potential exodus of top talent. The data management response is not easy and could stretch some firms to the limit as they...

BLOG

DSB Publishes Final Report on a Fee Model for the UPI

The Derivatives Service Bureau (DSB) has published its final report on a fee model for the Unique Product Identifier (UPI) that will come into play in July 2022. The report – Principles Underlying the Fee Model for the Unique Product Identifier (UPI) Service – is based on two consultation papers and considers both the UPI...

EVENT

RegTech Summit London

Now in its 6th year, the RegTech Summit in London explores how the European financial services industry can leverage technology to drive innovation, cut costs and support regulatory change.

GUIDE

Entity Data Management Handbook – Seventh Edition

Sourcing entity data and ensuring efficient and effective entity data management is a challenge for many financial institutions as volumes of data rise, more regulations require entity data in reporting, and the fight again financial crime is escalated by bad actors using increasingly sophisticated techniques to attack processes and systems. That said, based on best...