PR Newswire: LexisNexis® Risk Solutions today released the results of its annual Cybercrime Report, an analysis of data from 79.8 billion transactions processed through its LexisNexis® Digital Identity Network® throughout 2022.
Institutional Asset Manager: In a recent Crestbridge Alternative Managers’ Mood Index (CAMMI) survey, results highlighted the growing concern of investors in cybersecurity during the fundraising due diligence process in the fund management industry.
The Guardian: The outsourcing firm and government contractor Capita has revealed it will take a hit of up to £20m from a recent cyber-attack in which some customer, supplier and staff data was accessed by hackers.
Investment Executive: With economic activity increasingly taking place online, cyberattacks are an ever-present threat. That’s why cybersecurity companies — often referred to as the utilities segment of the digital world — continue to grow rapidly even in a sluggish economy.
Yahoo Finance: Agio, a leading managed IT and cybersecurity provider for financial services firms, published its annual 2023 Hedge Fund Managed IT Trends Report.
Forbes: Cybersecurity is not one thing but a layering of security tools and processes to protect your data. The two most common layers people think of are the firewall and antivirus solutions.
Verdict: Analysis of the key themes driving private equity deal activity reveals that cybersecurity accounted for 18 technology deals announced in Q1 2023, worth a total value of $2.1 billion.
ZDNet: Generative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated and novel attacks at large scale.
Crunchbase: It is difficult nowadays to talk to investors in any tech sector without AI coming up in the conversation — and that is certainly true in cybersecurity.
Forbes: Despite business leaders' growing awareness of cybercrime—and the rapid adaptations offered by new cybersecurity architectures—criminals continue to successfully exploit weaknesses created by these evolving business infrastructures.