CRA was engaged by a global data processing company to perform a compromise assessment after a large competitor suffered a widely publicized breach. CRA obtained endpoint visibility and performed threat hunting across the environment. CRA found several instances of malware as well as shortcomings in the environment’s security posture such as unmanaged assets and outdated software. The client was quickly able to remove the malware from their environment, update the outdated software, and improve their security posture.
Mitigating M&A cyber risk: pre- & post-acquisition due diligence
Robust cybersecurity and due diligence on a potential target are imperative in the face of escalating cyber threats and regulatory expectations. Comprehensive...