Antivirus

The need for open source audits in cybersecurity M&As

In today’s world cybersecurity is about more than just antivirus software and endpoint security software. Technical due diligence is a given in almost every acquisition or investment involving technology companies. While a tech diligence checklist can be daunting for acquirers and targets alike, a new study published by (ISC)2 confirms that auditing for cybersecurity is—and…


In today’s world cybersecurity is about more than just antivirus software and endpoint security software. Technical due diligence is a given in almost every acquisition or investment involving technology companies. While a tech diligence checklist can be daunting for acquirers and targets alike, a new study published by (ISC)2 confirms that auditing for cybersecurity is—and should be—at the top of the checklist. 

In fact, the (ISC)2 survey of 250 US-based M&A professionals showed that 100 percent of the executives and M&A advisors surveyed agreed that cybersecurity audits have become standard practice.

To understand why companies are auditing for cybersecurity, we must first understand the risk. In the same study, (ISC)2 found that security breaches that come to light during the due diligence process can derail a transaction; in fact, almost half (49 percent) of participants said they had seen it happen. 

Unsurprisingly, 52 percent of respondents viewed an audit revealing weak security practices as a liability. The same number said a post-acquisition security breach in an acquired company has affected the share value of a publicly traded organization. It’s clear a cybersecurity breach can significantly affect shareholder value. During M&A integration, it’s critical to expose and deal with any potential weakness at a target company.

About the author

Fred Bals is a senior technical writer at Synopsys.

Measuring risk

Cyberrisk is measured by comparing a company’s operational processes against some form of standard and reporting the results. How that evaluation is accomplished varies, including the standard chosen, the manpower consumed, and the credibility of the resulting report which rests upon the consulting firm’s reputation for its cybersecurity expertise. 

Assessing cybermaturity against a widely recognized standard is the best option for tech due diligence. The Cyber Security Framework (CSF)

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

The Main Street Tech Report: Microsoft Says Third Party Antivirus Software Is No Longer Needed

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports

Welcome to The Main Street Tech Report, your weekly roundup of the most important small business technology news. Here are five key developments in AI, automation, and digital tools that emerged this week-and what they mean for your business. Microsoft Officially Says You Don’t Need Extra Antivirus on Windows 11 Hans-Christian Dirscherl of PCWorld reports
Read More

Continue Reading
Antivirus

Researchers warn Microsoft Defender vulnerability is already being exploited

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…

A security researcher known as Chaotic Eclipse recently disclosed a vulnerability dubbed “Red Sun” affecting Microsoft Defender Antivirus. While criticizing Microsoft’s handling of the issue, Chaotic Eclipse explained that their proof-of-concept code could potentially be used to bypass Defender’s protections. The researcher also claimed that malicious actors have already begun…Read Entire Article…
Read More

Continue Reading
Antivirus

Signed software abused to deploy antivirus-killing scripts

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …

A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. …
Read More

Continue Reading
Antivirus

Stop falling for scams when Norton’s antivirus software is 70% off right now

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…

For a limited time, you can get a year of Norton 360 Premium, which includes a VPN and scam protection, at a major discount…
Read More

Continue Reading