Remove 2005 Remove Analysis Remove IoT Remove Systems administration
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Security 223
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

His 1994 book detailing cryptographic algorithms ( Applied Cryptography ) was just the beginning of his contributions to technical perspectives on system design, cybersecurity, privacy, and more. Dave Kennedy started as forensic analysis and cyber warfare specialist in the US Marine Corps before entering the enterprise space.