Page 35 - Cyber Defense Magazine RSA Edition for 2021
P. 35

Modern IT infrastructure is a mélange of on premises and cloud, hardware and software, owned and
            subscribed, in-house and third-party, fixed and ephemeral. And even if you have a handle on monitoring
            your IT estate, you’ve still got to pay attention to conditions affecting your direct and indirect partner
            relationships. The recent SolarWinds breach was a reminder of the ways criminal hackers can exploit
            weaknesses in the digital supply chain to work their way into target networks. But there is another threat
            that can take advantage of vulnerabilities in third-party systems and relationships that does not get the
            attention it deserves.


            The  high-tech  industry  changes  quickly.  Innovators  come  on  the  scene  with  new  ways  to  solve  old
            problems and, with the backing of venture capital, aggressively work to build market share. Mid-market
            players merge to create momentum. Large companies buy startups to add capabilities without incurring
            undue  risk.  Stockholders,  founders,  and  venture  capitalists,  all  eager  to  make  money  on  their
            investments, push for deals that will turn them a profit, disrupting markets and often creating chaos for
            customers.

            Wall Street tracks these mergers and acquisitions. When a public company is involved in the deal, it can
            affect stock prices and so it’s important for portfolio managers to pay attention. Industry analysts track
            these moves in an effort to provide guidance to clients who want to know what it means for them. Hackers
            pay attention to these developments, too. M&A activity often affects the security posture of organizations
            that are users of the technology or applications involved.

            After  a  company  has  been  acquired,  major  changes  to  the  product  typically  follow.  That  can  mean
            products  that  are  redundant  to  the  acquirer’s  catalog  are  killed  and  the  customers  migrated  to  the
            incumbent, or customer service and support teams that had developed detailed institutional knowledge
            of their users are not retained and the responsibilities shifted to new personnel or even outsourced. That
            can result in vulnerabilities that go undiscovered, unpatched, and exploitable.


            When disruption affects products that organizations rely on to keep data safe, the implications can be
            serious.  The  managed  file  transfer  (MFT)  industry,  where  Coviant  Software  operates,  is  one  such
            example. MFT products are a foundational element in data management and security programs, and
            their essential role is reflected in an annual growth rate of over 10%, and market value that will exceed
            $3 billion by 2026, according to Global Market Insights. That value has attracted M&A activity resulting
            in industry consolidation, with a number of key players getting purchased by larger organizations.

            In one case, a twenty-year-old file transfer appliance in wide use got caught between the obsolescence
            of its operating system and the release of its newly designed replacement. Hackers took advantage of
            the lapse and breached a number of well-known companies, including the Kroger supermarket chain and
            Royal Dutch Shell, operator of Shell gas stations. According to TechRepublic, the appliance was left
            vulnerable to exploitation by a common SQL injection attack, and while it is hard for an outsider to know
            the details of any data breach, experts familiar with the situation suggest that resources and attention
            were shifted from the legacy product to the replacement. Meanwhile, the operating system’s maker ended
            its support of the product, and so patches were not being written and distributed.

            Poor communication and coordination seem to be the common thread in the breaches that resulted,
            prompting one security expert to recommend to TechRepublic that organizations “do a closer analysis of







                                                                                                              35
   30   31   32   33   34   35   36   37   38   39   40