The Latest in IT Security

Creating a secure network post acquisition

29
Apr
2016
Creating a secure network post acquisition

Creating a secure network post acquisition

I have written before about the wisdom of involving security early in the process of acquiring another company. But given what happened at my company last week, it’s probably a good idea to say it all again.

The CFO broke the news that we were acquiring a smaller software company in a meeting with most of the executive staff and other department heads. It was greeted as a welcome development, since we had been struggling with the question of whether we should divert resources to develop a needed feature in our product or instead purchase a company that could fill that gap

Read More

Leave a reply


Categories

SUNDAY, OCTOBER 21, 2018
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks