
Sign up to save your podcasts
Or
Follow Fedinsider on LinkedIn
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors — who with a little compromised code began opening extremely hard to find doors to sensitive data.
In this week’s episode of Feds At the Edge, we’ve gathered thought leaders who share how in the wake of a large-scale attack in 2021, they structured a response through prioritizing, patching and preauthorization efforts.
What do they think should be in your defensive playbook?
Using system visibility to create a prioritized tier system
Limiting access during patching activities
Utilizing a Software Bill of Materials
Vetting users on a separate site before granting access
Tune in on your favorite podcasting platform for lessons learned in this remediation so your organization can be prepared for the next threat in the never-ending battle on the cybersecurity playing field.
5
55 ratings
Follow Fedinsider on LinkedIn
More than twenty years have passed since Log4J became the go-to cure for system administrators everywhere, but in that time, it also became a tantalizing target for malicious actors — who with a little compromised code began opening extremely hard to find doors to sensitive data.
In this week’s episode of Feds At the Edge, we’ve gathered thought leaders who share how in the wake of a large-scale attack in 2021, they structured a response through prioritizing, patching and preauthorization efforts.
What do they think should be in your defensive playbook?
Using system visibility to create a prioritized tier system
Limiting access during patching activities
Utilizing a Software Bill of Materials
Vetting users on a separate site before granting access
Tune in on your favorite podcasting platform for lessons learned in this remediation so your organization can be prepared for the next threat in the never-ending battle on the cybersecurity playing field.