Ensuring Cyber Security Due Diligence during an Acquisition

Since the focus of a merger or acquisition, or spin off is usually on enhancing competitiveness or scale of operations, cyber security is typically put on the backburner. The cursory due diligence conducted before an acquisition seldom results in a robust security posture. The immediate challenge for a chief information security ofcer (CISO) after a merger, is ensuring that the new entity has a security baseline that measures up to the risks it faces. Despite the global M&A volume of $3.9 trillion in 2016, organizations are only now waking up to the importance of the cyber security posture in an M&A transaction.

Spotlight

Sine-Wave Technologies, Inc.

Infrastructure. Your business depends on it every day, but most businesses rarely worry about the reliability and capacity of their IT systems. At SineWave Technologies, our engineers are obsessed with building and maintaining high-availability (HA) systems, from distributed backup systems to multi-homed network cores to blended data services merging disparate carrier feeds. We design and implement complete solutions, and can monitor and manage your systems 24x7x365. Choose SineWave for your managed IT services.

OTHER WHITEPAPERS
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Cyber Security State of Tech in 2022

whitePaper | August 4, 2022

The Coronavirus pandemic accelerated technology adoption in ways thought unimaginable just a few short years ago. But in the background and often without much fanfare, cybercrime grew far worse. Threat actors continued their work – often backed by millions of dollars from hostile foreign governments – to penetrate networks and wreak havoc on digital infrastructures

Read More

Spotlight

Sine-Wave Technologies, Inc.

Infrastructure. Your business depends on it every day, but most businesses rarely worry about the reliability and capacity of their IT systems. At SineWave Technologies, our engineers are obsessed with building and maintaining high-availability (HA) systems, from distributed backup systems to multi-homed network cores to blended data services merging disparate carrier feeds. We design and implement complete solutions, and can monitor and manage your systems 24x7x365. Choose SineWave for your managed IT services.

Events