Note we discuss Log4j as this is a very timely topic to this control.
Abstract: Cyber defenders are constantly being challenged from attackers who are looking for vulnerabilities within their infrastructure to exploit and gain access. Defenders must have timely threat information available to them about: software updates, patches, security advisories, threat bulletins, etc., and they should regularly review their environment to identify these vulnerabilities before the attackers do. Understanding and managing vulnerabilities is a continuous activity, requiring focus of time, attention, and resources.
Sponsor: CyberCNS interview with Shiva Shankar, CTO & Founder at minute 45:22.
Learn more here: https://www.cybercns.com/ (free trial)
Shiva Shankar: https://www.linkedin.com/in/shivashankarj/
Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
Wes Spencer: https://www.linkedin.com/in/wesspencer/