Challenges of cybersecurity due diligence in the acquisition process
Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …
Acquirers are increasingly aware of the need for vigorous cybersecurity due diligence in M&A, yet often lack the proper personnel to conduct thorough analyses, according …
Worldwide security software revenue totaled $22.1 billion in 2015, a 3.7 percent increase in from 2014, according to Gartner. SIEM remained the fastest-growing segment in …
Avast Software and AVG Technologies have entered into a purchase agreement in which Avast will offer to purchase all of the outstanding ordinary shares of AVG for $25.00 per …
More than half of IT and security executives will lose their jobs as a result of failing to provide useful, actionable information. While the majority of board members say …
Symantec will acquire Blue Coat for approximately $4.65 billion in cash. The transaction has been approved by the Boards of Directors of both companies and is expected to …
Businesses are being hit with an extortion attempt based on attackers penetrating their network or websites and stealing corporate or user data. The attackers don’t say …
Research analysts are forecasting positive growth for many segments of the global IT security market over the next four years as several markets including BYOD security, …
Worldwide revenues for Big Data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase of more than 50% over the …
Most enterprises have accepted that its employees will use their own various, often mobile devices to access company assets, and have realized that the defined, more easily …
Recruiting open source talent is a top priority for hiring managers focused on recruiting technology talent, and recruiters are increasingly looking for more professional …
Attackers wielding ransomware are targeting enterprises through an often-found hole in the corporate network: Internet facing, poorly secured remote desktop servers. According …
Here is a simple truth: You can create the most revolutionary product ever, but if you can’t get word about it out, you’ll fail. Information security vendors …