InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Detecting and Protecting the Log4shell Vulnerability

Presented by

Sudeep Padiyar, Inon Shkedy and Dan Gordon

About this talk

Learn how to detect and prevent the Log4shell/Log4j vulnerability. In early Dec 2021, a new and severe vulnerability (​​CVE-2021-44228) has been identified in the widely used Apache Log4shell / Log4j Java logging package which gives the attacker the ability to run unauthenticated remote code execution on a targeted server. This vulnerability is actively being exploited. Well-known web services and applications such as Apple iCloud, Twitter, Amazon, Baidu, and Minecraft are reported to have all been targeted. This webinar will help you understand: - How the Log4shell / Log4j vulnerability creates significant risk - Overview of mitigation strategies - How Traceable AI can detect and block the exploit - Extended Q&A
API Security

API Security

2319 subscribers47 talks
Traceable - Intelligent API Security at Enterprise Scale
Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization.
Related topics