Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

The First 30

By Kristin Kinan

WOW.   What an EXCITING first month at Polyverse.   Cybersecurity 101.   Cybersecurity 201.   Crazy smart teammates, all with incredible focus.  Libraries of material to learn by.   A refresher course in Linux.   Interesting customers.   Big, scary problems to solve for.    Tools, tools, and more tools!

My first 30 days was also SHOCKING.   Lockdowns.   Zoom bombs.   Contact tracing.   Sewing masks.    Cyber-attacks in every sector.   Polymorphing my mother (if you don’t get that joke, read on).

There is a digital revolution in place that we could have never beta tested for.    Our baseline has been transformed.

One industry sector grabs me —- healthcare, for many obvious reasons.    Reflecting on my personal experience —  A specialist rescheduled a long-held appointment to a Zoom meeting.  (Yeah!  Finally! Telemedicine)   The pharmacy is delivering, for free.  And, my medical network is working more through electronic means (email and phone).

Looking at the broader and global landscape of healthcare —  Pharmaceutical scientists in Germany are sharing with scientists in America.    Patient information is being shared between different types of healthcare agencies, through the National Health Information Network.   There are wearable medical devices and digital document processing.  A recent report expands on how artificial intelligence can transform how healthcare is delivered.

The opportunities are astounding.   The efficiency factors touch each part of our lives.   And, the speed at which we can execute with our current set of tools and technologies is exciting.

BUT.   I tripped over something seemingly small.   I received an email from a laboratory that was canceling an appointment.  An appointment that was not mine.  And, it was an email addressed to Jane.  YIKES.

I paused (after calling the lab’s support team).    IS ALL THIS STUFF SAFE?    We are talking about really sensitive information, with all of the above opportunities!

My little issue speaks to patient privacy.   Researchers doing vaccine development will be concerned about intellectual property.    Business need to keep their servers and devices protected to secure patient information and keep their brands intact.   The risks associated with this explosion of digital data sharing span all disciplines, industries, and, financial aspects of this new world.

My learning is this:   we have to do things differently!

We will work differently, for certain.   We might be not be present at a meeting, and, we’ll learn new social norms to get to know one another.      If we’re an IT professional, we might not be at a data center when there is an escalation, an outage, or a hack.    If we’re a healthcare provider, not only will we develop new ways to treat a patient, take care of our teams, and protect our families, we’ll be responsible for the digital health of our offices, our partners, and, our businesses.

Developing a robust healthcare system is imperative.   Technological development for end user tools is critical.   We must move at speed — like open source!   And, it must be safe.

Back to the joke about polymorphing my mother…..     I liken protecting my mother from the coronavirus to creating a wall of defense against intrusion, disruption, and, escalations; and blocking things that will threaten her or make it difficult for her to live easily.    Little did I know that  It’s Polymorphing!

Polymorphing is an innovative way to block memory-based attacks against your Linux assets, with binary diversity.   It fortifies your castle from hackers, and, makes it difficult for them to propagate, bring you down, or blow up your budget.   It is an easy-to-use tool, and, it doesn’t impact the performance of your systems.  Most importantly,  it allows you to keep on doing your regular cybersecurity routines, without interruption from emergency patching.

I met with a customer yesterday who said “… with Security, You’re Never Done.”    So true!   We have the opportunity to think about cybersecurity, differently – and comprehensively.

It took one set of tools to polymorph my mother, protecting her from a virus.   Now I have another set of tools to protect our shared world of digital advances.

Interested in learning more?

Be the first to hear about the latest product releases and cybersecurity news.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.