Application Security

7/9/2018
05:30 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

6 M&A Security Tips

Companies are realizing that the security posture of an acquired organization should be considered as part of their due diligence process.
2 of 7

1. Involve Cybersecurity Early On
Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.
In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?
But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.
Image Source: Shutterstock via Gorodenkoff

1. Involve Cybersecurity Early On

Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.

In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?

But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.

Image Source: Shutterstock via Gorodenkoff

2 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft President: Governments Must Cooperate on Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/8/2018
5 Reasons Why Threat Intelligence Doesn't Work
Jonathan Zhang, CEO/Founder of WhoisXML API and TIP,  11/7/2018
Why Password Management and Security Strategies Fall Short
Steve Zurier, Freelance Writer,  11/7/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19186
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the route.php paymentMethod parameter.
CVE-2018-19187
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via an arbitrary parameter name or value that is mishandled in a success.php echo statement.
CVE-2018-19188
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the success.php fort_id parameter.
CVE-2018-19189
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via an arbitrary parameter name or value that is mishandled in an error.php echo statement.
CVE-2018-19190
PUBLISHED: 2018-11-14
The Amazon PAYFORT payfort-php-SDK payment gateway SDK through 2018-04-26 has XSS via the error.php error_msg parameter.