Securing the mobile user: Challenges for the acquirer
It’s tricky enough to perform post-merger integration or PMI between the IT systems of the acquiring company (let’s call them “Company A”) and the acquired (“Company B”). It gets a lot trickier when you’re trying to secure widely scattered...
Recent Comments