I had gum graft surgery earlier this week to cover an almost-exposed root due to my aggressive brushing over the years. As part of the recovery process, I was told to limit the movement of my mouth. That means no talking. Me? Okay. I quickly realized how much we take our voice for granted. How do I tell the pharmacist that I’m picking up my pain medication if I can’t speak? I typed a note on my smartphone to let him know I had a prescription pickup. He read it, smiled at me, and started speaking to me in sign language. He didn’t read my entire message he only read my first sentence: “I can’t speak.” He didn’t read my second sentence: “I just had gum surgery.” I waved at him, pointed to my eye, signed the letters C, A, and N, pointed to my ear and gave a thumbs up. He laughed out loud and apologized, but I loved the fact that he was able to quickly adapt to the situation, even though it turned out I wasn’t deaf.
Just like the pharmacist was able to adapt to the situation, security solutions must be able to quickly adapt to changing network environments. Many organizations turn to network segmentation as a way to improve their network security posture, but what happens if changes need to be made? Organizations need solutions that can accommodate quick network reconfigurations without compromising security or performance. I invite you to read the Trend Micro Brief featuring Gartner research: “ Address Network Segmentation Security Requirements with Integrated Advanced Threat Prevention ” to discover security best practices that can be applied to network segmentation projects and to learn how to address the security challenges of network segmentation to defend against the known, unknown, and undisclosed vulnerabilities in your environment.Zero-Day Filters
There are six new zero-day filters covering four vendors in this week’s Digital Vaccine (DV) package. A number of existing filters in this week’s DV package were modified to update the filter description, update specific filter deployment recommendation, increase filter accuracy and/or optimize performance. You can browse the list of published advisories and upcoming advisories on the Zero Day Initiative website.Cisco (1) 26768: ZDI-CAN-4219: Zero Day Initiative Vulnerability (Hewlett Packard Enterprise Network Automation) Hewlett Packard Enterprise (2) 26768: ZDI-CAN-4219: Zero Day Initiative Vulnerability (Hewlett Packard Enterprise Network Automation) 26770: ZDI-CAN-4221: Zero Day Initiative Vulnerability (Hewlett Packard Enterprise Cloud Optimizer) Microsoft (1) 26767: ZDI-CAN-4319: Zero Day Initiative Vulnerability (Microsoft Internet Explorer) Trend Micro (2) 26771: ZDI-CAN-4242: Zero Day Initiative Vulnerability (Trend Micro Smart Protection Server) 26772: ZDI-CAN-4243: Zero Day Initiative Vulnerability (Trend Micro InterScan Web Security VA) Missed Last Week’s News?
Catch up on last week’s news in myweekly recap.