Feed aggregator

Forward Air Shareholders Recommended to Vote AGAINST Three Unfit Legacy Directors at 2025 Annual Meeting by ISS

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
CLEVELAND--(BUSINESS WIRE)--Ancora Holdings Group, LLC (together with its affiliates, “Ancora” or “we”), a significant shareholder of Forward Air Corporation (NASDAQ: FWRD) (“Forward Air” or the “Company”), today announced that Institutional Shareholder Services Inc. (“ISS”), a leading independent proxy advisory firm, recommends that Forward Air shareholders vote AGAINST the reelection of three members of the Board of Directors (the “Board”) at the 2025 Annual Meeting of Shareholders: (1.) Chai

STRM Stock Alert: Halper Sadeh LLC Is Investigating Whether the Sale of Streamline Health Solutions, Inc. Is Fair to Shareholders

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
NEW YORK--(BUSINESS WIRE)--Halper Sadeh LLC, an investor rights law firm, is investigating whether the sale of Streamline Health Solutions, Inc. (NASDAQ: STRM) to MDaudit for $5.34 per share in cash is fair to Streamline shareholders. Halper Sadeh encourages Streamline shareholders to click here to learn more about their legal rights and options or contact Daniel Sadeh or Zachary Halper at (212) 763-0060 or sadeh@halpersadeh.com or zhalper@halpersadeh.com. The investigation concerns whether Str

BPMC Stock Alert: Halper Sadeh LLC Is Investigating Whether the Sale of Blueprint Medicines Corporation Is Fair to Shareholders

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
NEW YORK--(BUSINESS WIRE)--Halper Sadeh LLC, an investor rights law firm, is investigating whether the sale of Blueprint Medicines Corporation (NASDAQ: BPMC) to Sanofi is fair to Blueprint shareholders. Under the terms of the proposed transaction, Sanofi will pay $129.00 per share in cash at closing, and Blueprint shareholders also will receive one non-tradeable contingent value right (CVR) entitling the holder to receive two potential milestone payments of $2.00 and $4.00 per CVR for the achie

Broadstone Net Lease Provides an Update on Recent Business Activity and Participation at Nareit’s REITweek 2025 Annual Conference

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
VICTOR, N.Y.--(BUSINESS WIRE)--Broadstone Net Lease, Inc. (NYSE: BNL) (“Broadstone,” “BNL,” the “Company,” “we,” “our,” or “us”), today provided an update on its recent business activity through June 2, 2025. Additionally, the Company announced that BNL’s CEO, John Moragne and CFO, Kevin Fennell, will be participating in the Nareit REITweek 2025 Annual Conference in New York, NY on June 3 and June 4, 2025. JUNE 2025 BUSINESS UPDATE Quarter-to-date, we have invested $83.3 million, including $54.

Antares Closes $1.2 Billion Private Credit Continuation Vehicle Led by Ares Management

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
CHICAGO & NEW YORK--(BUSINESS WIRE)--Antares Capital and Ares Management Corporation (“Ares”) (NYSE: ARES) today announced the closing of Antares’ first continuation vehicle with over $1.2 billion in commitments. The transaction was led by Ares Credit Secondaries funds, along with a commitment from Antares. The continuation vehicle was established to purchase assets and limited partner interests from two comingled private credit funds comprising over 100 underlying first lien, floating rate loa

 Swander Pace Capital Acquires Maple Donuts

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
SAN FRANCISCO & BEDMINSTER, N.J.--(BUSINESS WIRE)--Swander Pace Capital Acquires Maple Donuts

CareTrust REIT Positions for Continued Growth with New $500 Million Term Loan and New Hires

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
SAN CLEMENTE, Calif.--(BUSINESS WIRE)--CareTrust REIT, Inc. (NYSE:CTRE) (“CareTrust”) announced today the closing of a new senior unsecured term loan and the hiring of two talented real estate professionals. These actions further bolster its growth platform and strengthen the Company's long-term prospects at a time of accelerating investment in its healthcare portfolio. New Term Loan The Company closed on an amendment to its existing credit agreement with KeyBank National Association and a synd

Uniphore Introduces Marketing Agents, Providing AI-Powered Automation to Marketers

Lastest from Businesswire - Mon, 06/02/2025 - 08:42
PALO ALTO, Calif. & DENVER--(BUSINESS WIRE)-- #AgenticAI--Uniphore launches Marketing Agents: a first-for-enterprise Agentic AI suite delivering natural language search, segmentation, and knowledge in the CDP

Everest Business Funding Earns National Recognition in 2025 for Best and Brightest Workplace

Lastest from Businesswire - Mon, 06/02/2025 - 05:42
NEW YORK--(BUSINESS WIRE)--Everest Business Funding, an alternative finance solution for small businesses, has again been named one of the Best and Brightest Companies to Work For in the Nation by the National Association for Business Resources. Following its 2024 recognition, this back-to-back honor reinforces Everest Business Funding's continued dedication to fostering an outstanding workplace culture focused on employee growth, collaboration, and long-term success. The Best and Brightest Com

ZEN.COM Partners With Episode Six to Accelerate Card Issuance Expansion Across Europe and Asia

Lastest from Businesswire - Mon, 06/02/2025 - 05:42
LONDON--(BUSINESS WIRE)--Episode Six, a leading global provider of enterprise-grade card issuing and ledger infrastructure, has been selected as the strategic technology partner by ZEN.COM, the European fintech redefining how people and businesses manage money globally, to power the launch of new debit card programs across Europe and Asia as part of ZEN.COM’s international expansion. The partnership marks a significant milestone for both companies: ZEN.COM is entering the Asian market, while si

Farallon Capital Management Releases Investor Presentation Outlining Value Creation Opportunities at T&D Holdings and the Need for Additional Independent Outside Directors

Lastest from Businesswire - Mon, 06/02/2025 - 05:42
SAN FRANCISCO--(BUSINESS WIRE)--Farallon Capital Management L.L.C. ("Farallon") today released a presentation highlighting necessary actions for T&D Holdings Inc. (“T&D HD” or the “Company”) (8795.T) to realize its full potential. The presentation details Farallon’s history with T&D HD as a long-term shareholder, its multi-year effort to engage constructively with T&D HD to drive change within the Company, and its proposals to unlock value for the benefit of all stakeholders (in

Northern Trust Appointed Custodian for Dutch Pension Fund BPF Beton

Lastest from Businesswire - Mon, 06/02/2025 - 05:42
AMSTERDAM--(BUSINESS WIRE)--Northern Trust (Nasdaq: NTRS) announced today that it has been appointed by Dutch pension fund BPF Beton to provide global custody, regulatory reporting, valuation and accounting, and performance analytics. BPF Beton is the industry pension fund for people working in the concrete products industry in the Netherlands with approximately EUR 1.2 billion (approximately US$1.2 billion) in assets as at 31 December 2024. Herman Prummel, country head, Netherlands, Northern T

TP ICAP Acquires Neptune Networks and Partners with Nine Global Investment Banks to Create New Dealer-to-Client Credit Business

Lastest from Businesswire - Mon, 06/02/2025 - 02:42
LONDON--(BUSINESS WIRE)--TP ICAP Group PLC (“TP ICAP”), a world-leading provider of financial markets infrastructure, today announced the acquisition of Neptune Networks (“Neptune”), an independent financial data company co-owned by a consortium of some of the world’s leading investment banks. Neptune delivers high-quality, real-time pre-trade bond market data from many sell-side banks to buy-side clients. TP ICAP will bring together Neptune’s extensive proprietary data network with Liquidnet’s

Hyundai Card Becomes First in Asia to Achieve UL Solutions Healthy Building Verifications for Cultural and Leisure Facilities

Lastest from Businesswire - Sun, 06/01/2025 - 20:42
NORTHBROOK, Ill.--(BUSINESS WIRE)--UL Solutions (NYSE: ULS), a global leader in applied safety science, today announced that four properties operated by Hyundai Card, a leading South Korean credit card company and a subsidiary of the Hyundai Motor Group, have become the first cultural and leisure buildings in Asia to receive UL Verified Healthy Building Marks, demonstrating a commitment to creating healthier and more sustainable indoor environments for employees and guests. The unique Hyundai C

CGC Deadline: Rosen Law Firm Urges Canopy Growth Corporation (NASDAQ: CGC) Stockholders with Losses in Excess of $100K to Contact the Firm for Information About Their Rights

Lastest from Businesswire - Sun, 06/01/2025 - 17:42
NEW YORK--(BUSINESS WIRE)--Rosen Law Firm, a global investor rights law firm, reminds investors that a shareholder filed a class action on behalf of purchasers of securities of Canopy Growth Corporation (NASDAQ: CGC) between May 30, 2024 and February 6, 2025. Canopy Growth describes itself as a company that “produces, distributes, and sells cannabis and hemp-based products for recreational and medical purposes.” For more information, submit a form, email attorney Phillip Kim, or give us a call

Cyber Security Is A Growing Need

Cyberattacks have increased in frequency and maliciousness, including phishing, ransomware, and distributed denial of service attacks against networks. Growing cyber threats to business reputation, operations, and intellectual property theft can impact your business’s ongoing viability.

Businesses of all sizes and sectors need increased cyber security diligence.  While larger enterprises have more data and often greater ransom demands, smaller business systems are usually easier to breach by hackers or bad actors.

To lower your risk of being hacked, everyone should take into account the following cyber hygiene guidelines:

  • Have a risk management plan that examines particular requirements and vulnerabilities as well as facilitates incident response. Your plan should cover the ramifications of new technologies such artificial intelligence and their potential use in cyber protection.
  • On a regular basis, follow release dates, patches, and upgrades on your operating system, networks, and devices.
  • Make sure your passwords are strong and not easy to guess; mandate passwords should have at least 8 characters with least one capital letter, one number and one special symbol.
  • Include authentication, for most sensitive access you should use biometrics.
  • Consider using strong encryption on sensitive date, preferably quantum-resistant.
  • Use Identity Access management and a Zero Trust approach; know what people and devices are in your business networks and what user privileges each person has.
  • All employees should be educated and reeducated on an annual basis with quarterly reminders about how to use social media responsibly and stay alert to phishing attempts. Note: employees are the #1 risk for your business’s cyber security.
  • Regularly back-up your sensitive business data. Think about keeping a copy of the information on a machine that is not in your business network.
  • All the employees should stay clear of public networks, and if you must use one then use a VPN.
  • If your business lacks the knowledge to manage the above cyber security measures, then consider using a Managed Security Service Provider (MSSP) or Managed Service provider (MSP) who can assess, upgrade, and safeguard your business’s cyber assets.

It is not just cyber hygiene that is important, but also having a strategy to stay secure and be resilient.

  • Take a risk management approach. Be proactive: be alert, train staff, discover gaps in your business’s security, and mitigate vulnerabilities to reduce risks. Owners and responsible managers should be familiar with the guiding principles of the National Institute of Standards and Technology (NIST) framework: Identify, Protect, Detect, Respond, Recover.
  • Now that generative artificial intelligence and machine learning tools are increasingly in use and sophistication by attackers and defenders alike, it is important to consider all components (people, technologies, procedures, and policies) of cyber security.
  • The foundation of cyber security is communication. Business owners and management must coordinate their objectives, work together, and evaluate the businesses information security programs, controls, and network safety on a regular basis. Preparedness comes from the exchange of threat intelligence and innovative security advances, plus it is essential that all people using the systems receive security awareness training.
  • Effective cyber security needs expertise. If your business does not have it internally, find reliable help outside. Owners and managers can always benefit from outside knowledge, opinions, and suggestions. Areas of special expertise should include policy, cyber security technology solutions and services, training, legal compliance, liability insurance, and governance.
  • New cyber technologies such as artificial intelligence, 5G, cloud and edge computing, and quantum computing are impacting the landscape. It is important to understand and use them in defense of your business.

Cyber security is becoming more sophisticated, plan and act now to defend your business from cyber-attack.

Cyber Security

Cyberattacks have increased in frequency and maliciousness, including phishing, ransomware, and distributed denial of service attacks against networks. Growing cyber threats to business reputation, operations, and intellectual property theft can impact your business’s ongoing viability.

Businesses of all sizes and sectors need increased cyber security diligence.  While larger enterprises have more data and often greater ransom demands, smaller business systems are usually easier to breach by hackers or bad actors.

To lower your risk of being hacked, everyone should take into account the following cyber hygiene guidelines:

  • Have a risk management plan that examines particular requirements and vulnerabilities as well as facilitates incident response. Your plan should cover the ramifications of new technologies such artificial intelligence and their potential use in cyber protection.
  • On a regular basis, follow release dates, patches, and upgrades on your operating system, networks, and devices.
  • Make sure your passwords are strong and not easy to guess; mandate passwords should have at least 8 characters with least one capital letter, one number and one special symbol.
  • Include multifactor authentication, for most sensitive access you should use biometrics.
  • Consider using strong encryption on sensitive date, preferably quantum-resistant.
  • Use Identity Access management and a Zero Trust approach; know what people and devices are in your business networks and what user privileges each person has.
  • All employees should be educated and reeducated on an annual basis with quarterly reminders about how to use social media responsibly and stay alert to phishing attempts. Note: employees are the #1 risk for your business’s cyber security.
  • Regularly back-up your sensitive business data. Think about keeping a copy of the information on a machine that is not in your business network.
  • All the employees should stay clear of public networks, and if you must use one then use a VPN.
  • If your business lacks the knowledge to manage the above cyber security measures, then consider using a Managed Security Service Provider (MSSP) or Managed Service provider (MSP) who can assess, upgrade, and safeguard your business’s cyber assets.

It is not just cyber hygiene that is important, but also having a strategy to stay secure and be resilient.

  • Take a risk management approach. Be proactive: be alert, train staff, discover gaps in your business’s security, and mitigate vulnerabilities to reduce risks. Owners and responsible managers should be familiar with the guiding principles of the National Institute of Standards and Technology (NIST) framework: Identify, Protect, Detect, Respond, Recover.
  • Now that generative artificial intelligence and machine learning tools are increasingly in use and sophistication by attackers and defenders alike, it is important to consider all components (people, technologies, procedures, and policies) of cyber security.
  • The foundation of cyber security is communication. Business owners and management must coordinate their objectives, work together, and evaluate the businesses information security programs, controls, and network safety on a regular basis. Preparedness comes from the exchange of threat intelligence and innovative security advances, plus it is essential that all people using the systems receive security awareness training.
  • Effective cyber security needs expertise. If your business does not have it internally, find reliable help outside. Owners and managers can always benefit from outside knowledge, opinions, and suggestions. Areas of special expertise should include policy, cyber security technology solutions and services, training, legal compliance, liability insurance, and governance.
  • New cyber technologies such as artificial intelligence, 5G, cloud and edge computing, and quantum computing are impacting the landscape. It is important to understand and use them in defense of your business.

Cyber security is becoming more sophisticated, plan and act now to defend your business from cyber-attack.

Cyber Security

Cyberattacks have increased in frequency and maliciousness, including phishing, ransomware, and distributed denial of service attacks against networks. Growing cyber threats to business reputation, operations, and intellectual property theft can impact your business’s ongoing viability.

Businesses of all sizes and sectors need increased cyber security diligence.  While larger enterprises have more data and often greater ransom demands, smaller business systems are usually easier to breach by hackers or bad actors.

To lower your risk of being hacked, everyone should take into account the following cyber hygiene guidelines:

  • Have a risk management plan that examines particular requirements and vulnerabilities as well as facilitates incident response. Your plan should cover the ramifications of new technologies such artificial intelligence and their potential use in cyber protection.
  • On a regular basis, follow release dates, patches, and upgrades on your operating system, networks, and devices.
  • Make sure your passwords are strong and not easy to guess; mandate passwords should have at least 8 characters with least one capital letter, one number and one special symbol.
  • Include multifactor authentication, for most sensitive access you should use biometrics.
  • Consider using strong encryption on sensitive date, preferably quantum-resistant.
  • Use Identity Access management and a Zero Trust approach; know what people and devices are in your business networks and what user privileges each person has.
  • All employees should be educated and reeducated on an annual basis with quarterly reminders about how to use social media responsibly and stay alert to phishing attempts. Note: employees are the #1 risk for your business’s cyber security.
  • Regularly back-up your sensitive business data. Think about keeping a copy of the information on a machine that is not in your business network.
  • All the employees should stay clear of public networks, and if you must use one then use a VPN.
  • If your business lacks the knowledge to manage the above cyber security measures, then consider using a Managed Security Service Provider (MSSP) or Managed Service provider (MSP) who can assess, upgrade, and safeguard your business’s cyber assets.

It is not just cyber hygiene that is important, but also having a strategy to stay secure and be resilient.

  • Take a risk management approach. Be proactive: be alert, train staff, discover gaps in your business’s security, and mitigate vulnerabilities to reduce risks. Owners and responsible managers should be familiar with the guiding principles of the National Institute of Standards and Technology (NIST) framework: Identify, Protect, Detect, Respond, Recover.
  • Now that generative artificial intelligence and machine learning tools are increasingly in use and sophistication by attackers and defenders alike, it is important to consider all components (people, technologies, procedures, and policies) of cyber security.
  • The foundation of cyber security is communication. Business owners and management must coordinate their objectives, work together, and evaluate the businesses information security programs, controls, and network safety on a regular basis. Preparedness comes from the exchange of threat intelligence and innovative security advances, plus it is essential that all people using the systems receive security awareness training.
  • Effective cyber security needs expertise. If your business does not have it internally, find reliable help outside. Owners and managers can always benefit from outside knowledge, opinions, and suggestions. Areas of special expertise should include policy, cyber security technology solutions and services, training, legal compliance, liability insurance, and governance.
  • New cyber technologies such as artificial intelligence, 5G, cloud and edge computing, and quantum computing are impacting the landscape. It is important to understand and use them in defense of your business.

Cyber security is becoming more sophisticated, plan and act now to defend your business from cyber-attack.

All images by Freepik

TMCI Deadline: Rosen Law Firm Urges Treace Medical Concepts, Inc. (NASDAQ: TMCI) Stockholders with Losses in Excess of $100K to Contact the Firm for Information About Their Rights

Lastest from Businesswire - Sun, 06/01/2025 - 11:42
NEW YORK--(BUSINESS WIRE)--Rosen Law Firm, a global investor rights law firm, reminds investors that a shareholder filed a class action on behalf of purchasers of securities of Treace Medical Concepts, Inc. (NASDAQ: TMCI) between May 8, 2023 and May 7, 2024. Treace Medical describes itself as a “medical technology company focused on advancing the standard of care for the surgical management of bunion and related midfoot deformities.” For more information, submit a form, email attorney Phillip K

Announcing Balaji Karumanchi as Founder & CEO of Excelhire – The AI-Agentic Hiring Intelligence Platform

Lastest from Businesswire - Sun, 06/01/2025 - 08:42
FRISCO, Texas--(BUSINESS WIRE)-- #AI--Excelhire, the AI-powered hiring intelligence platform, proudly announces Balaji Karumanchi as its Founder and Chief Executive Officer.

BIOSIG TECHNOLOGIES INVESTOR ALERT by the Former Attorney General of Louisiana: Kahn Swick & Foti, LLC Investigates Merger of BioSig Technologies, Inc. - BSGM

Lastest from Businesswire - Sat, 05/31/2025 - 14:42
NEW YORK & NEW ORLEANS--(BUSINESS WIRE)--Former Attorney General of Louisiana Charles C. Foti, Jr., Esq. and the law firm of Kahn Swick & Foti, LLC (“KSF”) are investigating the proposed merger of BioSig Technologies, Inc. (NasdaqCM: BSGM) and Streamex Exchange Corporation. Upon closing of the proposed transaction, current BioSig shareholders and holders of common stock equivalents will hold 25% of the fully diluted BioSig common stock outstanding. KSF is seeking to determine whether the me

HELIOGEN INVESTOR ALERT by the Former Attorney General of Louisiana: Kahn Swick & Foti, LLC Investigates Adequacy of Price and Process in Proposed Sale of Heliogen, Inc. - HLGN

Lastest from Businesswire - Sat, 05/31/2025 - 14:42
NEW YORK & NEW ORLEANS--(BUSINESS WIRE)--Former Attorney General of Louisiana Charles C. Foti, Jr., Esq. and the law firm of Kahn Swick & Foti, LLC (“KSF”) are investigating the proposed sale of Heliogen, Inc. (OTC: HLGN) to Zeo Energy Corp. (NasdaqCM: ZEO). Under the terms of the proposed transaction, shareholders of Heliogen will receive shares of Zeo’s Class A common stock valued at approximately $10 million in the aggregate, based on a Zeo Class A common stock price of $1.5859 per share

Pages