Cybersecurity M&A deal flow: List of 200 transactions in 2017 | CSO Online

Cybersecurity M&A deal flow: List of 200 transactions in 2017 | CSO Online

The cybersecurity market is expected to ring up sales of $1 trillion cumulatively between 2017 and 2021.  In 2017, more than 200 cybersecurity startups received venture funding. With a flurry of new entrants looking to grab a slice of the spending, there’s an equal amount of market consolidation.
Over the past year, the cybersecurity market saw more than 200 mergers and acquisitions. The deal flow, tracked quarterly by the Cybersecurity Ventures M&A Report, has been compiled into an annual recap for CSO readers.

(more…)

ICYMI | Identity Theft – The CPA Journal

ICYMI | Identity Theft – The CPA Journal

Identity theft continues to be a serious issue for individuals and businesses. According to Javelin Research’s 2016 Identity Theft Study, $15 billion was stolen from 13.1 million individuals in 2015 (Al Pascual, Kyle Marchini, and Sarah Miller, “2016 Identity Fraud: Fraud Hits an Inflection Point,” Feb. 2, 2016, http://bit.ly/2fWJgco). For businesses, data breaches can compromise customers, clients, and employees; furthermore, it has been estimated that 90% of data breaches impact small businesses (“Small Businesses: The Cost of a Data Breach is Higher than You Think,” First Data Market Corporation, http://bit.ly/2gQCl1Z). In light of these statistics, it is essential for CPAs to address the financial and tax issues related to individual identity theft as well as compromised business data that can translate into identity theft for customers, clients, and employees.

Where Will The Cybersecurity Battle Lines Be Drawn In 2018?

Where Will The Cybersecurity Battle Lines Be Drawn In 2018?

Rich Campagna is the CEO of Bitglass. He previously served as senior director of product management at F5 Networks.  Beneath everyday web traffic, there’s a fierce battle raging for the security of the Internet. On one side are the villains; cyber criminals ranging from thrill-seeking amateurs to nation states. On the other side are the cybersecurity professionals, including researchers and analysts, all of whom seek to protect data.

(more…)

Hackers targeting Apple, Google app stores with malicious crypto apps

Hackers targeting Apple, Google app stores with malicious crypto apps

Hackers are targeting app stores from the likes of Apple and Google with malicious cryptocurrency apps to steal money and personal data, according to a study.  Researchers at cybersecurity firm RiskIQ analyzed more than 18,000 apps to detect ones that are blacklisted by cybersecurity vendors.  Their research found that 661 blacklisted cryptocurrency apps were found across 20 app stores including Apple’s App Store, Google Play and others.

(more…)

PSD2 – the directive that will change banking as we know it

PSD2 – the directive that will change banking as we know it

In short, PSD2 enables bank customers, both consumers and businesses, to use third-party providers to manage their finances. In the near future, you may be using Facebook or Google to pay your bills, making P2P transfers and analyse your spending, while still having your money safely placed in your current bank account. Banks, however, are obligated to provide these third-party providers access to their customers’ accounts through open APIs (application program interface). This will enable third-parties to build financial services on top of banks’ data and infrastructure.

(more…)