Even if your organization doesn’t use OpenSource software, most of your suppliers and vendors probably do. It’s time for everyone to start paying attention to the chaotic roller coaster ride that is OpenSource security. Like a roller coaster, most vulnerabilities in OpenSource software are exciting, but not that dangerous. Then, every once in a while, things get out of control and they might even crash. The recently discovered log4j vulnerability is one of those instances, where the prevalence of the log4j software means that almost everyone is going to be affected at some point.
In this webinar, get expert security guidance from CSA’s Chief Blockchain Officer and Director of Special Projects, Kurt Seifried. We’ll discuss a basic maturity model for dealing with OpenSource security, where one size definitely does not fit all. We’ll also look at the implications of various practices, such as running up to date vs. pinning older versions. Finally, we’ll examine some real world incidents and what you can do to reduce the cost of handling them efficiently.
In the weeks leading up to the CSA Research Summit, join us for three featured webinars about recent news and trends that have inspired CSA Research. Learn more about why our cloud security research is paramount to addressing critical issues in the cybersecurity space.
The CSA Research Summit is taking place on March 9th & March 10th, 2022. For full event details, please visit: https://csaurl.org/csaresearchsummit2022