Feds at the Edge

Ep. 127 Learning from Log4j: How to Keep Government Applications Secure


Listen Later

Follow Fedinsider on LinkedIn

More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors — who with a little compromised code began opening extremely hard to find doors to sensitive data.

In this week’s episode of Feds At the Edge, we’ve gathered thought leaders who share how in the wake of a large-scale attack in 2021, they structured a response through prioritizing, patching and preauthorization efforts.

What do they think should be in your defensive playbook?

  • Using system visibility to create a prioritized tier system

  • Limiting access during patching activities

  • Utilizing a Software Bill of Materials

  • Vetting users on a separate site before granting access

Tune in on your favorite podcasting platform for lessons learned in this remediation so your organization can be prepared for the next threat in the never-ending battle on the cybersecurity playing field.

...more
View all episodesView all episodes
Download on the App Store

Feds at the EdgeBy FedInsider

  • 5
  • 5
  • 5
  • 5
  • 5

5

5 ratings