1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Creating a secure network post acquisition

Discussion in 'CSO' started by RSS, Apr 28, 2016.

  1. RSS

    RSS New Member Member

    I have written before about the wisdom of involving security early in the process of acquiring another company. But given what happened at my company last week, it’s probably a good idea to say it all again.

    Trouble Ticket

    At issue: The company has signed a deal to acquire a small software company, but no security review was conducted ahead of the deal’s close.

    Action plan: Quickly assess the company’s weaknesses and shore them up just as fast.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page