Remove Digital transformation Remove Libraries Remove Risk Remove Systems administration
article thumbnail

MY TAKE: Log4jā€™s big lesson ā€“ legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Log4j, for instance, is a ubiquitous logging library. Its rather mundane function is to record events in a log for a system administrator to review and act upon, later.

Security 223
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. Critical application processes are at the greatest risk, including those that are running in air-gapped environments,ā€ Gupta says.