How the Log4j Vulnerability is Forcing Change in Federal Cybersecurity Policy

15 | Shutterstock
CISA director Jen Easterly praised the work of cybersecurity personnel in responding to the Log4j vulnerability during the winter holidays, spotlighting a crowdsourced list identifying about 2,900 software products which include the open-source data-logging library. Each product will require a patch from its developer – from 1Password to Zyxel – to close the easily-exploited weakness […]
Must be a Paid Member or a Free Trial Member to Access Content. Members log in here.