Application Security

7/9/2018
05:30 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail

6 M&A Security Tips

Companies are realizing that the security posture of an acquired organization should be considered as part of their due diligence process.
2 of 7

1. Involve Cybersecurity Early On
Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.
In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?
But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.
Image Source: Shutterstock via Gorodenkoff

1. Involve Cybersecurity Early On

Typically there's a deal team and an integration team; the cybersecurity group works as part of the latter. However, the deal team could miss simple things, such as vulnerabilities, to more serious situations, such as not realizing that the new company's intellectual property had been stolen.

In most situations, security pros learn about an acquisition fairly late in the process, and their input focuses on how the parent company can securely integrate the acquired business to the corporate network. They most often perform a quick paper-based interview review of security controls, asking questions like: Is there a firewall? What kind of security monitoring does the acquired company have in place? What is the governance structure?

But, along with the paper-based interview, more mature companies that bring on the security team early on will do an assessment to find out whether compromises have occurred in the past. They also will do a penetration test, with the main goal to find out how easy or hard it is to break into the network.

Image Source: Shutterstock via Gorodenkoff

2 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
What We Talk About When We Talk About Risk
Jack Jones, Chairman, FAIR Institute,  7/11/2018
Ticketmaster Breach Part of Massive Payment Card Hacking Campaign
Jai Vijayan, Freelance writer,  7/10/2018
7 Ways to Keep DNS Safe
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/10/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Locked device, Ha! I knew there was another way in.
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-14337
PUBLISHED: 2018-07-17
The CHECK macro in mrbgems/mruby-sprintf/src/sprintf.c in mruby 1.4.1 contains a signed integer overflow, possibly leading to out-of-bounds memory access because the mrb_str_resize function in string.c does not check for a negative length.
CVE-2018-14329
PUBLISHED: 2018-07-17
In HTSlib 1.8, a race condition in cram/cram_io.c might allow local users to overwrite arbitrary files via a symlink attack.
CVE-2018-14331
PUBLISHED: 2018-07-17
An issue was discovered in XiaoCms X1 v20140305. There is a CSRF vulnerability to change the administrator account password via admin/index.php?c=index&a=my.
CVE-2018-14333
PUBLISHED: 2018-07-17
TeamViewer through 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between "[00 88] and "[00 00 00]" delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has ...
CVE-2018-14334
PUBLISHED: 2018-07-17
manager/editor/upload.php in joyplus-cms 1.6.0 allows arbitrary file upload because detection of a prohibited file extension simply sets the $errm value, and does not otherwise alter the flow of control. Consequently, one can upload and execute a .php file, a similar issue to CVE-2018-8766.