How to Prepare for the Next Log4j

When new critical vulnerabilities were found in log4j, the popular open-source utility used to generate logs inside java applications, it was key to act quickly. The associated vulnerabilities – CVE-2021-44228 and CVE-2021-45046 – also known as Log4Shell, permitted a Remote Code Execution (RCE) allowing attackers to execute arbitrary code on the host by using a bug found in the log4j library. The impact of this vulnerability was huge due to the broad adoption of this log4j library.

While the log4j crisis has passed, it is very likely that similar vulnerabilities will reoccur. Prepare for the next log4j by joining Tom Llewelyn from our Solution Engineering team to learn how to determine if your systems are affected & protect yourself with mitigating controls.

Speaker:
Tom Llewelyn
Senior Solutions Engineer, Northern EMEA

Thank you!

We’ve received your submission and will be in touch soon.

Trusted globally
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.
Booking.com logoIBM logo in bold white letters on a transparent background.Alaska Airlines logo in white text on a transparent background.Goldman Sachs logo in white text on a transparent background.T Mobile logo with a stylized T and the word Mobile in a serif font.SAP Concur company logo with stylized 'C' symbol in a square.

Prioritize and stop the threats that matter most.

When attackers move at cloud speed, every second counts. From prevention to defense, Sysdig is purpose-built and proven for the scale, speed, and complexity of the cloud.