M&A Security Considerations and the Importance of Due Diligence

Most post-merger cybersecurity challenges arise when the acquiring company fails to fully assess the cybersecurity posture of its acquisition target. After an acquisition, all vulnerabilities and incidents are the responsibility of the acquiring company. According to a Ponemon Institute survey, 59 percent of companies that experienced a data breach in…

Read More

What Is SIEM and How Does It Enhance Threat Detection?

Although security information and event management (SIEM) has been around for more than a decade, the solution continues to evolve. But too many enterprises still don’t know which security use cases SIEM can take on, how it can capture and leverage data — structured and unstructured, internal and external —…

Read More

Can Fraud Detection Solutions Deliver the Authentication, Risk and Compliance Tools Banks and Insurers Need?

Change is afoot in how organizations serving customers online can deliver fraud detection and improve the customer experience. The disruption is happening in every sector, especially banking and insurance. Growing customer expectations for immediate approval of new accounts and faster payments, for example, and a shift to real-time technology are…

Read More