Application Security

7/9/2018
05:30 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

6 M&A Security Tips

Companies are realizing that the security posture of an acquired organization should be considered as part of their due diligence process.
2 of 7

1. Involve Cybersecurity Early On
Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.
In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?
But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.
Image Source: Shutterstock via Gorodenkoff

1. Involve Cybersecurity Early On

Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.

In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?

But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.

Image Source: Shutterstock via Gorodenkoff

2 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-6504
PUBLISHED: 2018-09-20
A potential Cross-Site Request Forgery (CSRF) vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Cross-Site Request Forgery (CSRF).
CVE-2018-6505
PUBLISHED: 2018-09-20
A potential Unauthenticated File Download vulnerability has been identified in ArcSight Management Center (ArcMC) in all versions prior to 2.81. This vulnerability could be exploited to allow for Unauthenticated File Downloads.
CVE-2018-14796
PUBLISHED: 2018-09-20
Tec4Data SmartCooler, all versions prior to firmware 180806, the device responds to a remote unauthenticated reboot command that may be used to perform a denial of service attack.
CVE-2018-14821
PUBLISHED: 2018-09-20
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to r...
CVE-2018-14827
PUBLISHED: 2018-09-20
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.