article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

This is all part of corporations plunging into the near future: migration to cloud-based IT infrastructure is in high gear, complexity is mushrooming and fear of falling behind is keeping the competitive heat on. It reinforces the notion that a new portfolio of cloud-centric security frameworks must take hold, the sooner the better.

Security 224
article thumbnail

Log4J: What You Need to Know

Adam Levin

“Log4j is so prevalent – utilized by millions of third-party enterprise applications, cloud services and manufacturers, including Apple, Twitter and Tesla – that security teams may have difficulties pinpointing where the library is actually being used,” observed cybersecurity firm Duo Security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

It’s not difficult to visualize how companies interconnecting to cloud resources at a breakneck pace contribute to the outward expansion of their networks’ attack surface. Its function is to record events in a log for a system administrator to review and act upon. Related: Why ‘SBOM’ is gaining traction.

article thumbnail

3 Reasons Your Security Testing Tool Needs To Do Regression Testing

ForAllSecure

For instance, modifying a single line of code could introduce an input injection vulnerability or create a new dependency on a vulnerable library or module. Maximizing Security Vulnerability Detection Even seemingly minor changes to an application could trigger new security vulnerabilities that didn't exist previously.