2021-12-13T05:32:00Z

What does the Log4j/Log4Shell vulnerability mean for your company?

EB
  • 5
  • 49
PeerSpot user
5

5 Answers

SimonClark - PeerSpot reviewer
Real User
Top 5
2021-12-14T09:39:07Z
Dec 14, 2021
EB
Community Manager
Dec 14, 2021

@SimonClark thank you for your answer and for the advice!

PeerSpot user
Search for a product comparison in Application Security Tools
BH
Real User
2021-12-13T16:43:38Z
Dec 13, 2021
Jairo Willian Pereira - PeerSpot reviewer
Real User
Top 5
2021-12-13T11:53:51Z
Dec 13, 2021
EB
Community Manager
Dec 15, 2021
PeerSpot user
VG
Real User
Top 5Leaderboard
2021-12-21T08:01:45Z
Dec 21, 2021
EB
Community Manager
Dec 21, 2021

@reviewer1572348 what have you been doing or what do you recommend to mitigate the issue? 

PeerSpot user
EB
Community Manager
2021-12-14T07:41:29Z
Dec 14, 2021
Find out what your peers are saying about Sonar, Veracode, Checkmarx and others in Application Security Tools. Updated: July 2024.
793,295 professionals have used our research since 2012.
IoT Security
What is IoT security? IoT (internet of things) security encompasses the protection of all physical devices, spanning from industrial machines and energy grids to entertainment devices, along with the networks they connect with. IoT security is carried out by network security and operations teams that work to incorporate a security strategy and protection policy into standard procedure. This practice ensures that all devices connected to the network are protected against any data...
Download IoT Security ReportRead more

Related Q&As