Cyber Threats Targeting Mergers and Acquisitions

...

Download Global merger and acquisition activity reached record-breaking deal values in 2015 at over $4 trillion. These high levels of activity are expected to continue, making it all the more important to secure sensitive information. Failure to do so opens the door to threat actors looking to profit by exploiting financial markets and proprietary intellectual property.

This paper examines:
- Cyber risks or possible degradation to a company's security posture due to the M&A process
- Historical cases of threat actors
- Likely threats across the five-stages that companies typically go through during a merger or acquisition
- How to better understand the threats faced with M&A and how to mitigate accordingly

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    AT&T Customers to Get $88M in Refunds for Bogus Charges

    AT&T customers who had unauthorized third-party charges added to their bills will be getting their refunds soon, the Federal Trade Commission announced today.7 million AT&T customers who were charged up to $9.
  • 5300c769af79e

    If These are the Galaxy S8 On-Screen Buttons...💩

    Earlier today, a bunch of photos of a live Samsung Galaxy S8 showed up on Twitter, one of which gave us a first look at how Samsung may implement on-screen buttons for the first time.In the images below that were pulled from this Tab S3 dump, we see cropped images of a phone that matches up to previous leaks and reports of the Galaxy S8.
  • 5300c769af79e

    Report Throws the Book at Yahoo

    Slides show that Yahoo's revenue, excluding traffic acquisition costs, is projected to drop 15 percent to US$3.Another $120 million will go away in 2017, when Yahoo Japan moves over to Google, according to Re/code.
  • 5300c769af79e

    iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know

    Rather than click, Mansoor smartly forwarded the message to security researchers at the University of Toronto.The researchers found that the link would have force-installed a program through three previously unknown vulnerabilities in iOS.