Carahsoft, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Government Events and Resources

Events

CyCognito-microsite.png
CyCognito

Finding Apache Log4j Vulnerabilities In Your Attack Surface


Event Date: February 08, 2022

Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen Easterly, Director of CISA, called Log4Shell the most serious vulnerability she's seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to exploit the vulnerability.

CyCognito's Discovery and Autonomous Security Testing is the most comprehensive and accurate assessment available to give you an attacker's perspective on all of your externally facing assets - especially those that are vulnerable to attack. CyCognito finds vulnerable assets and tags them for inspection - particularly products and technologies to the Log4j vulnerability. Watch this recording to understand how you can identify your vulnerable technologies and get recommendations for the next steps you can take to protect your organization.

Watch this recording to learn about:
  • Key elements of a Log4j response plan
  • How the CyCognito platform can detect your exploitable Log4j vulnerabilities easily
  • Recommendations for a response plan that you can use for critical vulnerabilities today and in the future

Fill out the form below to view this archived event.


Resources


No resources were found. Please try another search.