News & Analysis as of

Software Acquisitions Cybersecurity

Procopio, Cory, Hargreaves & Savitch LLP

3 Steps to Protect Highly Sensitive Assets in an M&A Deal

Due diligence is a necessary part of any M&A transaction. This process can be an exhaustive deep dive into the target company’s history. In some cases, the buyer wants to assure itself of certain highly confidential and...more

Reveal

A Guide to Efficient Data Remediation for Law Firms in 2023

Reveal on

Data is like the mail: it just keeps coming in, day after day. Storing and maintaining it is a never-ending process. Excess data can slow down operations, diminishing a law firm’s productivity, profitability, and public...more

A&O Shearman

Software, connectivity, data and fintech dominate M&A in Silicon Valley

A&O Shearman on

As transaction activity in the tech sector continues to power ahead, new challenges and opportunities are confronting Silicon Valley companies and setting the agenda for the industry....more

Association of Certified E-Discovery...

Weekly Trends Report – 12/20/2018 Insights

Insight into where e-discovery, information governance cybersecurity, and digital transformation are heading – who is doing what now or in the future, what works and what doesn’t, and what people wish they could do but can’t...more

Akin Gump Strauss Hauer & Feld LLP

Six Recent Government Supply Chain Risk and Cybersecurity Initiatives

• DoD and other government agencies will scrutinize contractors’ supply chain security plans and programs from proposal submission to contract closeout. • The 2019 NDAA as approved by Congress and DHS initiatives highlight...more

5 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide