June 28, 2023, 4 p.m. | Sanara Marsh

Security Intelligence securityintelligence.com

By attracting attention from threat actors, merger and acquisition (M&A) events are a significant source of cyber crime risk. So much so that, according to a 2020 IBM Institute of Business Value study, more than one in three executives said they experienced data breaches that can be attributed to M&A activity during integration. Security ratings, […]


The post How to Manage Cyber Risk During Mergers and Acquisitions appeared first on Security Intelligence.

acquisition acquisitions amp attack surface management attention breaches business business value crime cyber cyber attack surface management cyber crime cyber risk cyber risk assessment data data breaches events executives ibm m&amp manage merger mergers mergers and acquisitions risk risk management study threat threat actors value

More from securityintelligence.com / Security Intelligence

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote