The Log4j lessons: so what IS vulnerability management anyway?
When your IT-department is confronted with a serious threat such as Log4j, you should be able to focus on problems that precede the question of whether you should and can patch or not.
When your IT-department is confronted with a serious threat such as Log4j, you should be able to focus on problems that precede the question of whether you should and can patch or not.
Although Log4j and follow-up attack vectors are still a real threat for many organizations, it’s certainly not too early to draw lessons learned from this episode. What made Log4j different from other ‘classic’ 2021 vulnerabilities such as Citrix, Kaseya, and Hafnium (Exchange) is the fact that it was much harder for organizations to pinpoint if they were vulnerable.
The Log4j vulnerability that was discovered on Thursday, December 9th, is still a pressing issue for many companies. Since its discovery, we’ve received many questions from customers, most of which we have gathered on this FAQ page. If you have any questions regarding the Log4j vulnerability, you can find the answer to many of them here.
How DNB Increased Cyber Resilience in the Financial Sector Through Advanced Cyber Testing
This roundtable is intended for senior decision-makers in cybersecurity, risk and technology within the financial sector. All participation requests are reviewed to ensure a balanced, peer-level discussion.
Please complete the form below to request participation.
Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.
Reveal true AI usage and build control without slowing down to embrace AI with confidence.
Tailored incident tabletop exercise that adapts live based on your decisions, revealing true bottlenecks and clear improvements.
Crisis coordination and hands-on support by our experienced CSIRT during major security incidents.
Complete the form to get your XDR Readiness Checklist.
Complete the form to request your CRQ Assessment.
Complete the form to get your Real MDRâ„¢ Walkthrough.
Fill out your details below and we’ll be in touch within one business day.
Fill out your details below and we’ll be in touch within one business day.
Fill out your details below and we’ll be in touch within one business day.
Fill out your details below and we’ll be in touch within one business day.
Fill in your details below to access the on-demand webinar:
Fill in your details below to access the on-demand webinar:
Fill in your details below to access the on-demand webinar:
Fill in your details below to access the on-demand webinar:
Fill in your details below to access the on-demand webinar:
Download our Managed Prisma Access latest Datasheet

Do the IoT Risk Assesment and take the next steps to securing our organisation

Fill in your details below to access the on-demand webinar:
How to improve your Cybersecurity Incident Response procedure: what best suits you and your organization.

Improve your organization’s cyber resilience, choose the Zero Trust route that best suits you.

Stay up to date on the latest cybersecurity news and trends.