Tracking Real-World Log4j Attacks

In this short webinar, you will learn how the vulnerability works, who is vulnerable, how to understand your exposure, and what your options are for mitigation.

This applies to both the original as well as the second vulnerability that was recently announced.

 

Watch Now
12-21-Log4j_attacks
Security

Vulnerability

Learn how the vulnerability works and who is vulnerable.

Presentation

Exposure

Learn how to understand your exposure.

Digital

Mitigation

Learn what your options are for mitigation.

Log4j is a critical vulnerability that is present in a popular Java logging framework.

Its broad presence across multiple application architectures, the ease in which it can be exploited, and the potential difficulties in patching the issue all make it an urgent matter for any business with potential exposure. 

In this short webinar, you will learn how the vulnerability works, who is vulnerable, how to understand your exposure, and what your options are for mitigation.

This applies to both the original as well as the second vulnerability that was recently announced. 

Watch this webinar by Cloud Native Security Advocate Rory McCune and VP Product Marketing, Story Tweedie-Yates to learn more!

CVE_log4j_Picture2_OK

Presented by:

Rory McCune

Rory McCune

Cloud Native Security Advocate

 

Story Frame

Story Tweedie-Yates

VP Product Marketing

Submit the form below to receive this information: