The web site is now storing only essential cookies on your computer. If you don't allow cookies, you may not be able to use certain features of the web site including but not limited to: log in, buy products, see personalized content, switch between site cultures. It is recommended that you allow all cookies.

April 2022

Wedbush highlights options available to Elon Musk in his battle for control of Twitter

On 14 April, Tesla and SpaceX CEO Elon Musk made a final unsolicited bid for Twitter at US$54.20/share. The bid was made after Musk had acquired 9.2% of its shares and declined a seat on the company’s board. However, since then, Twitter has adopted a poison pill approach to prevent him from taking over the company. The details of poison pill approaches differ by company, but it is designed to give a company’s board the option to flood the market with so much newly created shares that a takeover becomes prohibitively expensive.

Do You Need a Shareholders’ Agreement?

Failure to have a properly drafted shareholders’ agreement in place may have devastating consequences for your business. This article explores some practical examples where a properly drafted shareholders’ agreement will provide much-needed guidance.

The Revolution of Finance

With the emergence of blockchain technology and the powerful capabilities that this technology offers, the platform for financial innovation is here to stay and can no longer be left out of the conversation. Dale Russell elaborates further.

Have You Forgotten About POPI?

Protection of personal information (POPI) was a hot topic last year. Continued compliance is important and, if you have not taken any steps towards compliance, you should not delay any longer. This article provides a timely reminder of your POPI obligations.

What Are the Most Common Types of Cyber-Attacks, And Which Vulnerabilities Do They Exploit?

Counting the Costs of Cybercrime is a three-part series. In part one, we highlighted the impacts of cyber related crimes on your organisation. The damage caused by a cyber incident can be reduced to the acronym: "CIA"(Confidentiality, Integrity, and Availability). Refer to the link here for part one. This part provides an overview of the most common and successful cyber-attacks and the vulnerabilities that are being exploited.