The Due Diligence Gap: Why Cybersecurity Asset Visibility in M&A Must Come Before The Deal Closes
Cybersecurity asset visibility in M&A helps buyers uncover hidden assets, reduce inherited risk and protect deal value.
Cybersecurity asset visibility in M&A helps buyers uncover hidden assets, reduce inherited risk and protect deal value.
To be Secon. means acting with trust, integrity, and accountability.
It’s about excellence, collaboration, and continuous improvement.
We grow creatively to uplift our clients, team, and community.
Explore fresh perspectives, expert analysis, and real-world advice from our team. These articles are designed to help leaders navigate evolving threats and make smarter security decisions.

The Digital Operational Resilience Act (DORA) is shaping the way financial organisations approach operational resilience and third-party risk management. To unpack the complexities and provide actionable guidance, Secon and Quod Orbis hosted the webinar, “Exploring DORA and Third-Party Risk in

Cyber threats are no longer just an IT problem, they’re a critical business issue. In today’s digital landscape, no organisation is immune to the ever-evolving challenges posed by cybercriminals. The question is no longer if your organisation will face a

APIs are becoming a critical point of vulnerability, leaving organisations exposed to repeated attacks. In the last two years, 57% of organisations were hit by an API-related data breach (according to the 2025 State of API Security report). Despite the

The AWS Marketplace is a digital catalogue managed by Amazon Web Services that simplifies the procurement, deployment, and management of third-party software, data, and services. It offers a vast selection of solutions, including software for cyber security, machine learning, data

In partnership with Red Sift, we recently hosted a webinar to explore the latest changes in PCI DSS v4.0 and how these updates will impact businesses managing customer payment information. If you missed the session, you can find a recording

As part of its ongoing effort to enhance web security, Google is leading a movement to reduce the maximum validity period of TLS/SSL certificates to just 90 days. Expected to come into full effect by the end of 2024, this

Explore the unique cyber security challenges local governments face and discover tailored solutions to protect vital community services and data.

The financial sector has become a prime target for cyber threats. As digital transformation accelerates, financial entities have become increasingly reliant on Information and Communication Technologies (ICT) for their operations. However, this reliance also exposes them to significant risks, including

Over the last 25 years, the digital landscape has transformed beyond recognition. What began as a world connected by dial-up modems and basic email has evolved into a hyper-connected ecosystem. Cyber security, once a niche concern for IT departments, has