What did we learn from the recent Log4J 2 vulnerability? How are security holes like this changing the way organizations think about deploying enterprise software solutions?
In this episode of the Endace Packet Forensic files Michael Morris talks with Timothy Wilson-Johnston about the Log4J 2 threat and how it is being exploited in the wild. Timothy shares his thoughts about what Log4J 2 has taught us, and why organizations need to look at the bigger picture:
- How can you better defend against vulnerabilities of this type
- Why it's so important to closely scrutinize solutions that are deployed – and make sure you have visibility into components that might be included with those solutions