Privacy as Risk Assessment and Risk Mitigation Responding to Lo4J RCE using Honeypots, Simulation and WAF rulesThe Log4J RCE took all of us by surprise last December. The ubiquity of the library, the impact of the exploit (full server control), and ease of exploitation made it the perfect storm for DevOps and Security professionals. more
|