article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

What’s more, it will likely take a blend of legacy security technologies – in advanced iterations – combined with a new class of smart security tools to cut through the complexities of defending contemporary business networks. Log4j, for instance, is a ubiquitous logging library. Firewalls predate SIEMs.

Security 218
article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

The perpetrators of the Solar Winds breach , for instance, tampered with a build system of the widely-used Orion network management tool. Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Log4J: What You Need to Know

Adam Levin

The entire technology industry received a sizable lump of coal in their collective stocking earlier this week in the form of two major security vulnerabilities in a widely-used software tool. Log4J is an open-source software tool used to log activity on internet-based services and software. What is Log4J?

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. Because PowerShell executes in memory, it works out beautifully as a ready-made attack tool. Instead, memory attacks are transient.

article thumbnail

3 Reasons Your Security Testing Tool Needs To Do Regression Testing

ForAllSecure

For instance, modifying a single line of code could introduce an input injection vulnerability or create a new dependency on a vulnerable library or module. Don't settle for a tool that only identifies new issues. This is crucial for maintaining the security and stability of your software over time.

article thumbnail

Building the Relationship Between RM and IT

The Texas Record

As the result of a Survey of Employee Engagement (SEE), records management is more involved in the migration and rollout of records management related initiatives and tool deployments. Our programmers invite me to meetings involving any new system with a data retention consideration.

IT 60
article thumbnail

DevOps Chat Podcast: $2M DARPA Award Sparks Behavior Testing With ForAllSecure's Mayhem Solution

ForAllSecure

Brumley: About, oh, six months ago, we then went and raised money from NEA to help transition this from just a government tool to something in the enterprise section as well. You’re gonna push as part of your DevOps cycle through, you know, things like making sure you’re not using old versions of libraries. Ashley: Mm-hmm.