Remove Cybersecurity Remove Libraries Remove Risk Remove Systems administration
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. Log4j, for instance, is a ubiquitous logging library. The Sunnyvale, Calif.-based

Security 223
article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet. Its function is to record events in a log for a system administrator to review and act upon. Obfuscated tampering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

That’s Gartner’s estimate of global spending on cybersecurity in 2017 and 2018. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. A dictionary of publicly known cybersecurity vulnerabilities.

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. A dictionary of publicly known cybersecurity vulnerabilities.

article thumbnail

WILL AUTONOMOUS SECURITY KILL CVES?

ForAllSecure

When your organization builds and deploys an app, you're also inheriting the risk from each and every one of those code components. The risks don’t stop there. TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. A dictionary of publicly known cybersecurity vulnerabilities.