Ensuring Cyber Security Due Diligence during an Acquisition

Since the focus of a merger or acquisition, or spin off is usually on enhancing competitiveness or scale of operations, cyber security is typically put on the backburner. The cursory due diligence conducted before an acquisition seldom results in a robust security posture. The immediate challenge for a chief information security ofcer (CISO) after a merger, is ensuring that the new entity has a security baseline that measures up to the risks it faces. Despite the global M&A volume of $3.9 trillion in 2016, organizations are only now waking up to the importance of the cyber security posture in an M&A transaction.

Spotlight

Polyverse Corporation

Hacking today’s enterprise computer applications is a lot like playing lotto where the numbers are known in advance. No matter how sophisticated an organization’s cyberdefenses, if its valuable systems are static and unchanging, hackers will ultimately “figure out the winning numbers” to breach them and take the jackpot.Most hackers know exactly which numbers to play. For example, “zero-day” exploits that are readily available on the dark web can breach most application and system technologies with impunity, because no antivirus software signatures are yet available to defeat them. And advanced persistent threats, in which malware and backdoors can lurk undetected for months inside enterprise systems, wreak havoc and steal data with little chance of being spotted.

OTHER WHITEPAPERS
news image

Cisco Spaces – Privacy and Data Protection

whitePaper | December 2, 2022

Cisco Spaces is an indoor location services cloud platform that provides wireless customers with rich locationbased services, including location analytics, business insight, customer experience management, asset tracking, Bluetooth Low Energy (BLE) management, and API.

Read More
news image

C2 Identity Security White Paper

whitePaper | December 20, 2022

Organizations are adopting distributed and complex network security due to the changing organizational structure trend. C2 Identity is essential to any business to improve convenience and flexibility in managing identity information and access privileges while protecting corporate resources from unauthorized access, both within and outside the organization's boundaries.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

Addressing The New Threat in Modern It Infrastructures

whitePaper | December 29, 2022

Data has become a new global currency. As with other currencies, it has also become a target for threats from those who wish to exploit its value. Ransomware is the new threat to data and it’s wreaking havoc on businesses of all sizes around the world. Until recently, if you ask an IT organization to describe typical causes for service outages they would most likely mention network failures, power failures, hardware failures, user error, etc. In today’s world, we can add ransomware to that list.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More

Spotlight

Polyverse Corporation

Hacking today’s enterprise computer applications is a lot like playing lotto where the numbers are known in advance. No matter how sophisticated an organization’s cyberdefenses, if its valuable systems are static and unchanging, hackers will ultimately “figure out the winning numbers” to breach them and take the jackpot.Most hackers know exactly which numbers to play. For example, “zero-day” exploits that are readily available on the dark web can breach most application and system technologies with impunity, because no antivirus software signatures are yet available to defeat them. And advanced persistent threats, in which malware and backdoors can lurk undetected for months inside enterprise systems, wreak havoc and steal data with little chance of being spotted.

Events