
Creating a Work-from-Home Business Culture
Vulnerabilities, from poor data hygiene to weak authentication, can be further amplified during times of crisis when some, or even entire workforces, may be working from home. Here are some…

Nordic Countries Score Huge Tech Successes, but Worries About Cybersecurity Mount
The Nordics have become a hot spot for innovation, producing technologies that have reshaped global industries, but governments and industry groups have been cautioning that the region’s phenomenal success could…

The Downsides of a Disorganized Merger for Your Acquisition
Adequate preparation, due diligence and stable execution are necessary for smooth mergers and acquisitions. Failure to do so can result in a choppy path – with potential to hold back,…

Shadow IT: The Danger of Open Tech Stacks
Banking, financial services and insurance companies are in danger—and this danger is lurking at employees’ fingertips. Employees, clients and vendors are wooed daily by unvetted third-party apps that promise to…

Protecting Trade Secrets: A Crucial Part of Mergers and Acquisitions
Under normal circumstances, you might hide trade secrets behind hardened firewalls under heavy coded locks. But what about when you’re amid a mega merger or acquisition? You need to share…

Uniform or Patchwork Privacy Laws? How Your Bank Can Mitigate Cyber Risk
As more state privacy laws come into effect in the US, navigating privacy, data residency and jurisdictional requirements is more complicated than ever for banks and financial institutions with national…

The Importance of Synchronized Tech: Mergers and Acquisitions that Stick Need to Fit
The ink is dry. The handshakes have been made. Your company has just successfully negotiated a multi-million-mega dollar monster merger or acquisition. And your newest corporate addition has all the…

Selling ‘Risk Acceptance’ to Your Customers?
As organizations continue their digital migrations, the list of cyber-threats, risks and vulnerabilities grows exponentially. From a more connected workplace to new laws and regulations governing privacy and data protection,…

How to Ensure Only Intended Recipients Can Read Your Secure Message
We’ve all done it: You hit ‘send’ on a message only to notice a mistyped email address. But what if the email contained sensitive information, like a bank statement? What if…