InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Managing the Long Tail of Log4j

Presented by

Danny Connelly, CISO Americas Public Sector, Zscaler & Emily Laufer, Senior Product Marketing Manager Threat Labz, Zscaler

About this talk

If you haven’t done so already, it’s time to buckle in and prepare for the long process of dealing with the Log4j / Log4Shell (CVE-2021-44228) vulnerability, used in millions of websites and applications. The official lists of newly discovered sources and exploits related to this historic flaw are being updated daily. While thousands of patched updates have already been issued, the industry is still waiting for thousands more while bracing for the reality that many instances may never be patched. With every organization facing the long-term risks of the pervasive Log4j vulnerability, it's critical that your SecOps team prepares for a cybersecurity marathon, consisting of an effective plan for continuously managing the scale and complexity of this serious threat. Watch our webinar to learn how to create an effective SecOps plan for handling Log4j, including best practices to proactively: - Expose threat activity - Test your defenses - Eliminate threat vectors
Zscaler

Zscaler

31467 subscribers246 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics