Log4j zero day vulnerability: How to protect yourself

Log4j zero day vulnerability

The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete control of vulnerable devices and execute arbitrary code.  The Log4j 0-day vulnerability has to date, been detected in more than 3 million vulnerable instances. Researchers also found that nearly 68,000 vulnerabilities were present in cloud workloads and containers within the … Read More

Simple strategies for risk remediation in cyber security

Risk remediation in cyber security

Why remediation in cyber security is key to limiting the damage a breach can cause Remediation in cyber security refers to limiting the damage a breach can cause to your organisation. If you fail to notice and act upon a breach in a timely manner, it can move rapidly and becomes almost impossible to contain. As organisations worldwide expand, they … Read More

Open source security software risks

Open source security

What is open source security? Open source software security is the measure of assurance in the freedom from the risk inherent to an open source software system. Open source security refers to the processes and tools used to manage and secure compliance and OSS from development to production. These tools can automatically discover open source dependencies within applications, provide valuable … Read More