Security and risk management in the wake of the Log4j vulnerability

Cover Image

Cybercriminals and nation-states are already crafting new forms of malware to take advantage of old versions of Log4j before they can be patched. And many of these attacks have already succeeded. Learn how organizations are improving their capacity for finding specific software components at scale to prepare for the next open-source software vulnerability. 

Vendor:
Tanium
Posted:
Mar 25, 2022
Published:
Mar 25, 2022
Format:
HTML
Type:
eBook
Already a Bitpipe member? Log in here

Download this eBook!