Adopting Zero Trust

Log4j Continues to act as Organizational Vulnerability


Listen Later

Season 3, Episode 13: Cato Network’s Etay Maor provides fresh research on the abuse of unpatched log4j libraries.

Catch this episode on YouTubeAppleSpotify, or AmazonYou can read the show notes here.

This week on Adopting Zero Trust (AZT), we highlight a significant cybersecurity risk focused on the notorious Log4j vulnerability and the growing concern around shadow IT. Featuring expert insights from Etay Maor, the Chief Cybersecurity Strategist at Cato Networks, the conversation initially looks into the persistent exploitation methods, the importance of knowing one’s cybersecurity environment, and strategic approaches to mitigating risks.

...more
View all episodesView all episodes
Download on the App Store

Adopting Zero TrustBy Adopting Zero Trust

  • 5
  • 5
  • 5
  • 5
  • 5

5

4 ratings


More shows like Adopting Zero Trust

View all
CyberWire Daily by N2K Networks

CyberWire Daily

1,006 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

166 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

189 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

"No Trust" by Zero Trust Forum by "No Trust" by Zero Trust Forum

"No Trust" by Zero Trust Forum

5 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

34 Listeners