Access "Secure Reads: Mergers and Acquisitions Security"
This article is part of the December 2005 issue of Top forensics tools for tracking down cybercriminals
Mergers and Acquisitions Security By Edward P. Halibozek and Dr. Gerald L. Kovacich Elsevier, 250 pages, $39.95 Rarely a week goes by without some company merging with or buying another firm. Security managers play a complicated triple role in the process, providing security services to the acquisition team, helping to evaluate the effectiveness of the target company's security program and integrating the two security organizations. @exb Mergers and Acquisitions Security @exe In Mergers and Acquisitions Security: Corporate Restructuring and Security Management, Edward Halibozek and Gerald Kovacich bring these roles to light, if in a roundabout way, and show how security managers are integral parts of the merger and acquisition (M&A) process. This is not a book about computer security-- the intended audience is the security executive who oversees physical and IT security. But there is good information for those security pros who lack experience with this type of expansion. Charts, bullet points, case studies and discussions of the business drivers behind M&As... Access >>>
Premium Content for Free.
Building A Perimeter Defense With Application-Level Firewalls
Learn how application level firewalls, when carefully deployed, can build perimeter defenses and prevent hackers from exploiting vulnerabilities, such as application code, to achieve attacks.
To Catch a Thief
Forensics tools aren't only used in high-profile cases.
On the Mend
Health care giant Novartis AG got a much-needed shot in the arm with a comprehensive risk assessment and revamped security management system.
Recent Releases: Security product briefs, December 2005
Learn about the security products released in December 2005.
Controlling the Uncontrollable
Organizations must leverage policy, and harness new protocols and technology to tame wild WLANs.
Information Security's 2006 Priorities Survey signals a transition for security managers from an operational to a more strategic stance.
- Building A Perimeter Defense With Application-Level Firewalls
Hot Pick: Citrix Systems' Citrix Access Essentials
Citrix Systems' Citrix Access Essentials
SSL VPN: Array Networks' Array SPX5000
A review of Array Networks' Array SPX5000
Configuration Management: Configuresoft's Enterprise Configuration Manager v4.7
Configuresoft's ECM v4.7
Application Security: Cenzic's Hailstorm v2.6
Cenzic's Hailstorm v2.6
Secure Reads: Mergers and Acquisitions Security
Read a review of the security book Mergers and Acquisitions Security.
- Hot Pick: Citrix Systems' Citrix Access Essentials
On The Radar: Security technology can't solve process problems
Perspectives: History teaches security lessons well
Expert Richard Bejtlich looks at the lessons learned in engineering disasters and applies them to information security.
Editor's Desk: Security for the corporate brand
Know Thy Business
Ping: Desiree Beck
- On The Radar: Security technology can't solve process problems
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.