HackDig : Dig high-quality web security articles for hacker

Caveat Emptor: Identifying Insider Threats Acquired From Mergers and Acquisitions

With all the industry studies, articles and literature related to insider threats, it is baffling to see that very few have focused on how insider threats are acquired — in fact, paid for — during a merger and acquisition process. Organizations are so fixated on driving profits and staying competitive that they gobble up any tangible asset they can. Compani
Publish At:2017-08-02 12:30 | Read:2967 | Comments:0 | Tags:Risk Management Acquisition audit Insider Threat Risk Risk A

What Leading Analysts Are Saying about IBM’s Acquisition of CrossIdeas

IBM recently acquired CrossIdeas, adding to the IBM Security Systems division and its existing identity and access management (IAM) portfolio. Prior to this acquisition, the company had already partnered with IBM in the Ready for IBM Security Intelligence program, and it integrated its identity and access governance solution platform with the IBM Security Id
Publish At:2014-08-23 04:40 | Read:3908 | Comments:0 | Tags:CISO Identity & Access access governance Acquisition audit c

An Equity Investor's Due Diligence

By Gunter Ollmann, @gollmann  Information technology companies constitute the core of many investment portfolios nowadays. With so many new startups popping up and some highly visible IPO's and acquisitions by public companies egging things on, many investors are clamoring for a piece of the action and looking for new ways to rapidly qualify or di
Publish At:2014-08-12 01:40 | Read:3693 | Comments:0 | Tags:acquisition due diligence gunter ollman hacking hardware sec


Share high-quality web security related articles with you:)


Tag Cloud