InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Stop the Apache Log4J Vulnerability and Prevent Future Attacks With Zero Trust

Presented by

Deepen Desai, CISO & VP Security Research Zscaler & Rick Miles, Senior Director of Product Management at Zscaler

About this talk

A devastating vulnerability was recently discovered in the popular Apache Log4j Java logging library that allows attackers to execute code remotely. If your enterprise security team is scrambling to assess the impact of this vulnerability to your own organization, Zscaler and the ThreatLabz research team would like to help. In this webinar, join Deepen Desai, Zscaler CISO and VP of Threat Research, and Rick Miles, Senior Director of Product Management, as they cover everything we know about this vulnerability, including up-to-date information on: - What the CVE-2021-44228 vulnerability is, and how it’s been exploited in the wild - How to assess and remediate any potential impact to your organization - Steps Zscaler has taken to ensure protections for our customers and our cloud - How to use a zero trust architecture to strengthen your risk posture and minimize the impact of future vulnerabilities
Zscaler

Zscaler

31600 subscribers248 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics