Normal view
Why Netflixβs 72B Warner Bros. Deal Could Change How You Watch TV
Netflixβs $72 billion takeover of Warner Bros. Discovery reshapes Hollywood, uniting HBO, DC, and major film libraries under one streaming giant.
The post Why Netflixβs 72B Warner Bros. Deal Could Change How You Watch TV appeared first on TechRepublic.
Why Netflixβs 72B Warner Bros. Deal Could Change How You Watch TV
Netflixβs $72 billion takeover of Warner Bros. Discovery reshapes Hollywood, uniting HBO, DC, and major film libraries under one streaming giant.
The post Why Netflixβs 72B Warner Bros. Deal Could Change How You Watch TV appeared first on TechRepublic.
Netflix to acquire Warner Bros. in a disruptive deal valued at $82.7B
Cybersecurity M&A Roundup: 30 Deals Announced in November 2025
Significant cybersecurity M&A deals announced by Arctic Wolf, Bugcrowd, Huntress, Palo Alto Networks, and Zscaler.
The post Cybersecurity M&A Roundup: 30 Deals Announced in November 2025 appeared first on SecurityWeek.
What is Bending Spoons? Everything to know about Eventbriteβs acquirer
Bending Spoons agrees to buy Eventbrite for $500M to revive stalled brand
μλΉμ€λμ°, μ μ 보μκΈ°μ λ² μ μΈμ νμΒ·Β·Β·10μ΅ λ¬λ¬ μ΄μ κ·λͺ¨ μ λ§
μλΉμ€λμ°(ServiceNow)κ° μ μ 보μ μ€ννΈμ λ² μ(Veza)λ₯Ό 10μ΅ λ¬λ¬ μ΄μμ μΈμνκΈ° μν λ§λ°μ§ νμμ μ§ν μ€μΈ κ²μΌλ‘ μλ €μ‘λ€.
μ‘°μ§ μ λ°μ AI μμ΄μ νΈλ₯Ό λ°°ν¬ μ€μΈ μλΉμ€λμ° κ³ κ° μ μ₯μμλ μ΄λ² μΈμκ° μ€μν 곡백μ μ±μ°λ μν μ νλ€. μ¦, AI μμ΄μ νΈκ° μ΄λ€ λ°μ΄ν°μ μ κ·Όνκ³ μ΄λ€ μμ μ μνν μ μλμ§λ₯Ό ν΅μ ν μ μκ² λλ€. λ² μμ κΈ°μ μ κΈ°μ μμ€ν μ λ°μ κΆν ꡬ쑰λ₯Ό λ§€νν΄ μ¬μ©μ, μ ν리μΌμ΄μ , AI μμ΄μ νΈκ° μ΄λ€ λ°μ΄ν°μ μ κ·Όν μ μλμ§ λͺ ννκ² λ³΄μ¬μ€λ€.
맀체 λμΈν¬λ©μ΄μ (The Information)μ ν΄λΉ μΈμ κ±΄μ΄ λ€μ μ£Ό λ°νλ μ μλ€κ³ 보λνλ€.
μ΄λ² νμμ μμ μλΉμ€λμ°λ μ§λ 3μ 무λΈμμ€(Moveworks)λ₯Ό 28μ΅ 5μ²λ§ λ¬λ¬ κ·λͺ¨μ μΈμν λ° μλ€. ν΄λΉ μΈμλ‘ μλΉμ€λμ° νλ«νΌμ AI μ΄μμ€ν΄νΈμ μν°νλΌμ΄μ¦ κ²μ κΈ°λ₯μ ν보νλ€. μ¬κΈ°μ λ² μκ° λν΄μ§λ©΄, ν΄λΌμ°λ μλΉμ€Β·SaaS μ ν리μΌμ΄μ Β·λ΄λΆ μμ€ν μ λ°μμ AIκ° λ°μ΄ν°λ₯Ό μ κ·Ό λ° νμ©νλ κ³Όμ μ κ΄λ¦¬νλ μ μ 보μ κ³μΈ΅μ΄ μλ‘κ² κ΅¬μΆλλ€.
λ€λ§ μλΉμ€λμ°μ λ² μλ μμ§ κ³΅μ μ μ₯μ λ°νμ§ μμλ€.
κΈ°κ³ μ μ κ΄λ¦¬
μλΉμ€λμ°λ μ§λ 3μ, ITΒ·HRΒ·κ³ κ° μλΉμ€Β·λ³΄μ μ΄μ μ λ°μ κ±Έμ³ κ³ κ° νκ²½μ μμ² κ°μ AI μμ΄μ νΈλ₯Ό λ°°ν¬νλ€κ³ λ°νλ€. μ΄λ¬ν μμ΄μ νΈκ° μ μ λ μμ¨μ μ 무λ₯Ό μννλ©΄μ, κΈ°μ μ μ΄λ€μ΄ μ΄λ€ λ°μ΄ν°μ μ κ·Όν μ μλμ§, κ·Έλ¦¬κ³ κ·Έ κΆνμ΄ λ³΄μ μ μ± κ³Ό μΌμΉνλμ§ νμ ν΄μΌ νλ€λ μλ°μ λ°κ³ μλ€.
HFS리μμΉμ λΆλν μ μ€νΈ ν°μΌκΈ°λ βμλΉμ€λμ°λ AI μμ΄μ νΈκ° λ¨μν λννλ μμ€μ λμ΄ μ€μ λΉμ¦λμ€ λ΄λΆμμ μλ―Έ μλ νλμ μννλ νλ«νΌμ ꡬμΆνλ € νκ³ μλ€. 무λΈμμ€λ κ°λ ₯ν μλν λ μ΄μ΄λ₯Ό μ 곡νμ§λ§, μ λ’°μ κ±°λ²λμ€λ μ¬μ ν λΉμ΄ μλ λΆλΆμ΄μλ€. μ μΒ·κΆνΒ·μ κ·Ό κ·μΉμ΄ μμ ν κ²¬κ³ νμ§ μμ μνμμ μ€μκ° κΆνμ μμ΄μ νΈμ λκΈ°λ κ²μ μ΄λ€ κΈ°μ λ κ°μνκΈ° μ΄λ €μ΄ μνβμ΄λΌκ³ μ§λ¨νλ€.
λ² μλ 보μ μ λ¬Έκ°λ€μ΄ βλΉμΈκ° μ μ(non-human identity) λ¬Έμ βλΌκ³ λΆλ₯΄λ μμμ ν΄κ²°νκ³ μλ€. λ² μμ λ°λ₯΄λ©΄, AI μμ΄μ νΈμ API ν΅ν©, μλν μν¬νλ‘μ°λ λͺ¨λ κ΄λ¦¬κ° νμν μλΉμ€ κ³μ κ³Ό ν ν°μ λ§λ€μ΄λ΄λ©°, λλΆλΆμ κΈ°μ μμλ μ΄λ¬ν κΈ°κ³ μ μμ΄ μΈκ° μ¬μ©μλ³΄λ€ ν¨μ¬ λ§μ μλ₯Ό μ°¨μ§νλ€.
λ² μμ βκΆν κ·Έλν(Authorization Graph)β κΈ°μ μ μμ€ν μ λ°μ κΆνμ λ§€νν΄ λ¨μν βλκ° μ κ·Όν μ μλκ°βκ° μλλΌ, βμ κ·Ό κΆνμΌλ‘ μ€μ μ΄λ€ νλμ μνν μ μλκ°βλ₯Ό 보μ¬μ€λ€. λ² μλ λΈλμ€ν€, μ΅μ€νΌλμ, μν¬λ°μ΄ λ± μ£Όμ κ³ κ°μ¬μ 200μ΅ κ±΄μ΄ λλ κΆνμ κ΄λ¦¬νκ³ μλ€. 2020λ μ€λ¦½ μ΄ν μ΄ 2μ΅ 3,500λ§ λ¬λ¬λ₯Ό ν¬μλ°μμΌλ©°, 2025λ 4μ κΈ°μ€ μμ§μ μλ 190λͺ μ΄μμ΄λ€.
ν°μΌκΈ°λ κΈ°μ‘΄ μ μ λ° μ κ·Ό κ΄λ¦¬(IAM) λκ΅¬κ° μΈκ° μ¬μ©μ κ³μ μ μ€μ¬μΌλ‘ μ€κ³λΌ κΈ°κ³ μ μ, API ν€, μμ¨ μμ΄μ νΈμ μ€μκ° νλ¨ μ²λ¦¬μλ νκ³κ° μλ€κ³ μ§μ νλ€. κ·Έλ βμ΄λ‘ μΈν΄ κΆνμ 무λΆλ³ν νμ°, μμ€ν κ° μ κ·Ό κ²½λ‘μ μ¬κ°μ§λκ° λ°μνλ€βλΌκ³ μ€λͺ νλ€.
ννΈ μμ¬λ μ΄λ―Έ νλ ₯ κ΄κ³λ₯Ό λ§Ίκ³ μλ€. μλΉμ€λμ° λ²€μ²μ€(ServiceNow Ventures)λ 2023λ 8μ μΊνΌνΈμ λ²€μ²μ€μ ν¨κ» λ² μμ ν¬μν λ° μμΌλ©°, 보λμ λ°λ₯΄λ©΄ μλΉμ€λμ°μ λ² μλ 250κ³³μ΄ λλ 곡λ κ³ κ°μ 보μ νκ³ μλ€.
κ³ κ° ν΅ν© κ³Όμ
μ΄λ² μΈμλ‘ μΈν΄ λ μμ€ν μ΄ μ°λλλ λ°©μμλ μ€λν λ³νκ° λνλ μ μλ€. νμ¬ μλΉμ€λμ°μ λ² μλ₯Ό ν¨κ» μ¬μ©νλ κΈ°μ λ€μ λ μμ€ν μ λ³λλ‘ μ΄μνκ³ μμ§λ§, ν΅ν©μ΄ μ΄λ€μ§λ©΄ μλΉμ€λμ°μ AI μμ΄μ νΈκ° λ² μμ κΆν μΈν 리μ μ€λ₯Ό κΈ°λ°μΌλ‘ μ κ·Ό μ μ± μ μ§μ μ‘°ννκ³ μ μ©ν μ μκ² λλ©°, κ³ κ°μ΄ λ³λμ 컀μ€ν μ°λμ ꡬμΆν νμκ° μμ΄μ§κ² λλ€.
ν°μΌκΈ°μ λ°λ₯΄λ©΄ μ΄λ¬ν ν΅ν©μλ μκ°μ΄ νμν μ λ§μ΄λ€. κ·Έλ βμλΉμ€λμ°λ μ΄λ―Έ κ±°λνκ³ λ³΅μ‘ν μμ€ν μ΄λ©°, μ¬κΈ°μ μμ ν μ μ 보μ μμ§μ μΆκ°νλ μμ μ μ¦μ μ μ©λ μ μλ ννλ μλ κ²βμ΄λΌκ³ λ§νλ€. λν κ³ κ°μ λ νλ«νΌμ΄ ν΅ν©λλ©΄μ λΌμ΄μ μ€ μ²΄κ³κ° λ³κ²½λκ³ μ κ· λͺ¨λμ΄ λμ λ κ°λ₯μ±μ μΌλμ λ¬μΌ νλ€.
μλΉμ€λμ° μμ΄ λ² μλ§ μ¬μ©νλ κΈ°μ μ λ² μκ° λ 립ν μ νμΌλ‘ κ³μ μ 곡λ μ§ νμ ν νμκ° μλ€. λ°λλ‘ μλΉμ€λμ°μ ν¨κ» λ€λ₯Έ μ μ κ΄λ¦¬ μ νμ μ¬μ©νλ κΈ°μ μ κΈ°μ‘΄ λκ΅¬κ° κ³μ μ§μλλμ§, μλλ©΄ μλΉμ€λμ°κ° μμ¬ ν΅ν© μ€νμΌλ‘μ μ νμ μ λν μ§ νμΈν΄μΌ νλ€.
μλΉμ€λμ°λ μ§λ 5μ βλλ¦¬μ§ 2025β νμ¬μμ 보μ λ° λ¦¬μ€ν¬ κ΄λ¦¬λ₯Ό μν AI μμ΄μ νΈλ₯Ό 곡κ°νλ©° μ΄λ₯Ό μμ¨μ κΈ°μ λ°©μ΄ λκ΅¬λ‘ μ μνλ€. λ² μλ μ΄λ¬ν 보μ μμ΄μ νΈκ° λ€μν μμ€ν μμ μνμ μμ νκ² μ‘°μ¬νκ³ λμνλ λ° νμν κΆν μ μ΄ κΈ°λ₯μ μ 곡νκ² λλ€.
ν°μΌκΈ°λ λ² μκ° μ κ·Ό κΆνμ βκ΄κ³ κΈ°λ° λ¬Έμ βλ‘ λ°λΌλ³Έλ€κ³ μ€λͺ νλ€. μ¦, μ μΒ·κΆνΒ·λ°μ΄ν°μ μ°κ²° ꡬ쑰λ₯Ό λΆμν΄ μ΄λ‘ μ μΈ κΆνμ΄ μλλΌ μ€μ ν¨κ³Όμ μΈ μ κ·Ό κΆνμ 보μ¬μ€λ€λ μλ―Έλ€.
μμ₯ μν₯
μ΄λ² μΈμκ° μ±μ¬λλ©΄ μλΉμ€λμ°λ AI κΈ°λ° μν°νλΌμ΄μ¦ νλ«νΌμ ꡬμΆνλ €λ κ²½μμ¬μ λΉκ΅ν΄ λ μμ±λ λμ κΈ°μ μ€νμ ν보νκ² λλ€. μΈμΌμ¦ν¬μ€, λ§μ΄ν¬λ‘μννΈ(MS), μ€λΌν΄ λ± μ£Όμ κΈ°μ λ€λ AI μμ΄μ νΈλ₯Ό μ 곡νκ³ μμ§λ§, ν°μΌκΈ°λ νλ‘ νΈμλ μλνμ μ μ 보μμ μλΉμ€λμ°Β·λ¬΄λΈμμ€Β·λ² μ μ‘°ν©μ²λΌ κ²°ν©ν μ¬λ‘λ μμ§ μμλ€κ³ μΈκΈνλ€.
ν°μΌκΈ°λ βμ΄λ² μΈμλ μ λ¬Έ μμμΌλ‘ λ¨μμλ κΆν κ΄λ¦¬ μΈν
리μ μ€λ₯Ό λκ·λͺ¨ μν°νλΌμ΄μ¦ νλ«νΌ λ΄λΆλ‘ λμ΄λ€μ΄λ λ³νλΌ μ μ 보μ μμ₯μ νλλ₯Ό νλ€ μ μλ€βλΌκ³ λΆμνλ€. κ·Έλ μ¬μ΄λ²μν¬, μΈμΌν¬μΈνΈ, μ₯νμ²λΌ λ
립μ μΌλ‘ μ΄μλλ μ μ 보μ κΈ°μ
μ΄ ν₯ν νλ«νΌ ννΈλμμ΄λ μΈμ λμμ λͺ¨μν΄μΌ νλ μλ°μ λ°μ μ μλ€κ³ μ λ§νλ€.
dl-ciokorea@foundryco.com

ServiceNow is in talks to buy identity security firm Veza for over $1 billion: report
ServiceNow is reportedly in advanced talks to acquire Veza, an identity security startup, for more than $1 billion.
For ServiceNow customers deploying AI agents across their organizations, the acquisition would address a critical gap: controlling what those agents can access and do. Vezaβs technology maps permissions across enterprise systems, showing exactly which users, applications, and AI agents have access to what data.
The deal could be announced next week, The Information reported.
The deal would follow ServiceNowβs $2.85 billion acquisition of Moveworks, announced in March. That purchase brought AI assistants and enterprise search capabilities to ServiceNowβs platform. Adding Veza would provide the identity security layer needed to govern those AI systems as they access data across cloud services, SaaS applications, and internal systems.
ServiceNow and Veza did not immediately respond to requests for comment.
Managing machine identities
ServiceNow said in March that it deployed thousands of AI agents for customers across IT, HR, customer service, and security operations. As these agents take on more autonomous tasks, enterprises face mounting pressure to understand what they can access and whether those permissions align with security policies.
βServiceNow is trying to build an enterprise platform where AI agents donβt just chat, but actually take meaningful actions inside the business,β said Akshat Tyagi, associate practice leader at HFS Research. βMoveworks gave them a strong automation layer, but trust and governance were the missing pieces. Handing over real-time authority to agents unless identity, permissions, and access rules are rock solid is a bluff no enterprise wants to play.β
Veza addresses what security experts call the non-human identity problem. Every AI agent, API integration, and automated workflow creates service accounts and tokens that need management, according to the company. In most enterprises, these machine identities far outnumber human users.
Vezaβs Authorization Graph technology maps permissions across systems to show not just who has access, but what they can effectively do with that access. According to its website, the company manages more than 20 billion permissions for customers, including Blackstone, Expedia, and Workday. Veza has raised $235 million since its inception in 2020 and employed more than 190 people as of April 2025.
Tyagi said existing identity and access management tools were designed for human accounts but struggle with machine identities, API keys, and autonomous agents making real-time decisions. βThis creates blind spots around privilege sprawl and cross-system access paths,β he said.
The two companies already work together. ServiceNow Ventures invested in Veza in August 2023 alongside Capital One Ventures. The companies have more than 250 joint customers, the report added.
Customer integration questions
For those joint customers, the acquisition would mean significant changes in how the two systems work together. Enterprises using both ServiceNow and Veza today run them as separate systems. Integration would allow ServiceNowβs AI agents to natively query and enforce access policies based on Vezaβs permission intelligence, without customers building custom connections.
That integration will take time, according to Tyagi. βServiceNow is already a big and complex system, and adding a full identity security engine wonβt be instant plug-and-play,β he said. Customers should expect changes to licensing and the introduction of new modules as the two platforms merge.
Organizations using Veza without ServiceNow will want clarity on whether the product remains available as a standalone offering. Those using ServiceNow with other identity vendors will need to know if their existing tools remain supported or if ServiceNow will push customers toward its own integrated stack.
ServiceNow unveiled AI agents for security and risk management at its Knowledge 2025 conference in May, positioning them as tools for autonomous enterprise defense. Veza would provide the authorization controls those security agents need to safely investigate and remediate threats across systems.
Veza treats access as a relationship problem, connecting identities, permissions, and data to show effective access rather than just theoretical permissions, according to Tyagi.
Market implications
The acquisition would give ServiceNow a more complete offering against rivals building AI-powered enterprise platforms. Salesforce, Microsoft, and Oracle all offer AI agents, but none had combined front-end automation with identity security in the way ServiceNow was attempting with Moveworks and Veza, according to Tyagi.
βThis deal can shake up the identity security landscape because it pulls deep authorization intelligence into a major enterprise platform instead of keeping it as a standalone specialty,β Tyagi said. Standalone identity vendors like CyberArk, SailPoint, and Okta may face pressure to find their own platform partnerships or acquisition targets, he said.

Adobe to buy Semrush for $1.9 billion
Seattleβs Parse Biosciences to be acquired by Qiagen for $225M

Seattleβs Parse Biosciences is teed up for an acquisition by Qiagen, a Netherlands-based holding company, in a $225 million cash deal announced this week.
The transaction is expected to close in December.
Parse was co-founded in 2018 by Alex Rosenberg, who was a University of Washington postdoctoral fellow at the time, and Charles Roco, who was a UW graduate student. The company was an early entrant in the nascent field of single-cell RNA sequencing.
Rosenberg and his colleagues discovered a new way to profile RNAs while working in the lab ofΒ UW synthetic biology professor Georg Seelig. The business initially launched as Split Biosciences, later changing its name and growing to 110 employees.
Parse has raised more than $50 million from investors, including a $41.5 million Series B round announced in 2022.
Parse launched its first products in 2021 and currently serves 3,000 customers in more than 40 countries. The company is expected to add about $40 million in sales to Qiagenβs 2026 fiscal year.
Parse stated on its website that it will operate as a Qiagen subsidiary and βwill maintain full operations in our Seattle headquarters and all other locations around the world.β
Thereβs a vast range of research questions that RNA profiling can help answer. Understanding which RNAs are present in a cell gives scientists a read-out of active genes. That helps distinguish different cell types, for instance in a blood sample or a petri dish of stem cells turning into heart cells.
Parse touts the accessibility of its technology, which does not require specialized lab equipment to use.
βAs our team joins Qiagen, we want to accelerate that mission and extend the reach of our technology to more customers around the world,β said CEO Rosenberg in a statement, adding that Qiagenβs global infrastructure makes it βan ideal partner for our next stage of growth.β
Qiagen has developed technologies to isolate and analyze DNA, RNA and proteins from sources including blood, tissue and other materials. The company has about 5,700 employees in 35 locations. It serves 500,000 customers globally.
The acquisition is subject to clearance under the U.S. Hart-Scott-Rodino Antitrust Improvements Act and other conditions.
Cybersecurity M&A Roundup: 45 Deals Announced in October 2025
Significant cybersecurity M&A deals announced by Jamf, LevelBlue, Ping Identity, Twilio, and Veeam Software.
The post Cybersecurity M&A Roundup: 45 Deals Announced in October 2025 appeared first on SecurityWeek.
Bitsight buys dark web security specialist Cybersixgill for $115M
3 Approaches to Security Testing for Third Parties
What You Should Consider Before Launching a Security Test for Your Third Parties and Vendor
A paradox of cybersecurityβs function in business is that businesses provide value by creatively sharing and using information, but cybersecurity benefits from less sharing and access to data.Β
This holds doubly true in the area of third-party security for large organizations that must adhere to stricter regulations, such as banks and government agencies. It is nearly impossible to conduct business without frequently and openly sharing valuable information with, or via, third parties.Β
Drug developers rely on clinical research partners for essential data. Banks exchange information with credit agencies, other banks, regulators and more. All of this drives software development and infrastructure changes constantly, and some percentage of those changes introduce security vulnerabilities that are detected late in the process, which poses risk for the organizations.Β
Many feel that they get more security βbang-for-the-buckβ through third-party testingβtesting the software of others. A 2022 study by the Ponemon Institute found that while 75% of respondents are concerned about the risk of ransomware linked to third parties, only 36% of organizations evaluate their own security and privacy practices. An earlier 2019 Ponemon study found that if it were a third party that caused a data breach, the cost increased by more than $370,000 (raising it to $4.3 million). Shoring up third-party defenses clearly has benefits for multiple parties (and your customers).
How Synack Customers Test Third Parties
Synack has seen customers try different approaches for testing third parties. Tests are either 1) encouraged, 2) required or 3) coordinated.Β
In the first model, third parties are strongly encouraged to get a security test from Synack and share the results with their partner, usually the larger of the two companies. Itβs not forced; ultimately, itβs up to the third party to decide if their relationship benefits from a security test.Β
In the second model, security testing is a requirement for a relationship to be contractually completed. Finally, the Coordinated Testing model is the one Synack sees growing the fastest. In this model, the larger company with several third parties to test purchases tests on behalf of other companies and mandates testing. Usually, they specify the testing intensity as well, by choosing a basic Synack test or a more comprehensive offering. This secures testing resources and makes it easier to share data via a testing platform built for it.Β
Issues to Consider when Testing Third Parties
Whichever model you prefer, there are several things to consider. First, what is the chargeback model, if any, for security tests? Does the third party pay, the first party or someone else? Does the payment happen up front or in a later, internal accounting?Β The latter helps execute testing faster, which is ultimately what many companies want to reduce risk earlier.
Next, what legal agreements need to be in place? All Synack customers have clear contracts with Synack that cover testing. In some cases, an identical contract is needed with a third party, but more frequently, itβs a simpler agreement. Consult with your legal team to find the simplest but most effective way to expand testing on your assets, regardless of where they reside.Β
Finally, there is information sharing. Do vulnerabilities found on a third party get reported to the primary party? In most cases, the primary party simply wants to know that vulnerabilities are not present, which can be done with patch verification reports. Synackβs robust role-based access control system and reporting allow for any choice along this spectrum to be securely shared according to the wishes of the companies. Information can be shared via a final report, access to the Synack Portal (with real-time information about testing efforts and results) or both.
Whatever you choose, third-party security testing to clean up potential vulnerabilities advances the ultimate goal for many companies: safer users and data.Β
The post 3 Approaches to Security Testing for Third Parties appeared first on Synack.
-
TechCrunch - Dark Web
- Donβt buy a breach or a bad reputation: A more effective approach to M&A due diligence