Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

M&A

Tetra Defense Joins Arctic Wolf to Transform Incident Readiness and Response

When our customers begin their security journey with Arctic Wolf, our Concierge Delivery Model benchmarks their security programs against the NIST Cybersecurity Framework. The NIST framework spans five functions (Identify, Protect, Detect, Respond, Recover), and offers guidelines and best practices for organizations to better manage, reduce, and ultimately end cyber risk.

M&A Trending In Cybersecurity Industry Vertical For 2022

Nowadays you need a scorecard to keep track of the monthly acquisitions and mergers in the cybersecurity industry. Mergers and acquisition (M&A) of products, capabilities, and companies has become a common strategy for business and market growth. Even through the Covid19 pandemic, trends in acquisition and consolidation of information security oriented companies remained quite strong. In fact, the volume of U.S.

Don't Forget The Digital Supply Chain During M&A...Because It Won't Forget You

Anyone who’s ever been in a relationship knows that the beginnings and ends are the toughest parts. This is when the baggage is dusted off, brought to light and (all too frequently) used detrimentally. Mergers and acquisitions — and their mirror image, divestments — are the organizational equivalents of marriage and divorce. During the process, past indiscretions are discovered, leveraged in negotiations and ideally rectified or laid to rest.

Nuvias UC Fuels Its Growth In Europe Through Alliance Technologies GmbH Acquisition

As part of its exciting and fast-paced growth, driven by increased demand from its customer base to provide best of breed solutions across Europe, Nuvias UC announces the acquisition of Alliance Technologies GmbH, a UC specialised, value added distributor founded in 2001.

Manage risks with software due diligence and open source audits

Similar to a home inspection, M&A software due diligence helps organizations assess the risk of an investment. When a company buys another company, the due diligence process is analogous to a home inspection during a real estate transaction. A buyer sees only so much when they tour a home—enough to know they like it and to assess the value, but not enough identify hidden problems that might devalue the property. An in-depth assessment requires time and expertise.

The Cybersecurity Playbook You Need to Run To Mitigate Risk During M&A

Mergers and acquisitions are high-risk endeavors, sometimes with billions of dollars and corporate reputations at stake. But one way to help lessen the danger is by conducting a thorough cybersecurity review during the due diligence process. The consulting and professional services team at Trustwave works closely with firms across the globe undertaking M&A deals of all sizes.

Nuvias Group Further Invests in Cyber Security and the BeLux Market with Deltalink Acquisition

Nuvias Group, the European high value distributor, is further accelerating its growth through a second investment this year, by acquiring Deltalink, the Value-Add Distributor (VAD) of cyber security and networking solutions, based in Belgium.

Outpost24 acquires Specops for enhanced user security and secures further funding to continue growth

Outpost24 today announced the acquisition of Specops Software, a leading provider of password management and user authentication solution, as well as securing another SEK 50 million funding from Swedbank Robur and Alcur Fonder.

Accelerating the Snyk infrastructure as code vision with the addition of CloudSkiff

We are thrilled to welcome the team at CloudSkiff to Snyk! Many of you may be more familiar with driftctl, the open source project started by the CloudSkiff team. I wanted to share with you why we’re excited about the addition of this fantastic group of people to Snyk, and our plans for the future of Snyk Infrastructure as Code (Snyk IaC), as well as our commitment to keeping driftctl open source.