Remove Cybersecurity Remove Libraries Remove Manufacturing Remove Systems administration
article thumbnail

Log4J: What You Need to Know

Adam Levin

The timing of the discovery of the vulnerability also works against organizations; many IT teams and cybersecurity personnel who would typically be working to apply patches and mitigate would-be cyberthreats often work with skeleton crews over the holiday season. The combination of these three factors represents a worst-case scenario. .