article thumbnail

What We Can Learn from the Log4j Vulnerability

Pure Storage

In December, a critical zero-day vulnerability was reported in the widely used Log4j framework. Log4j is so ubiquitous, in fact, that Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly called this “the most serious vulnerability I have seen in my decades-long career.”. And that’s the key to the vulnerability.

article thumbnail

Cybersecurity Tips: Risk and Vulnerability Management

Security Industry Association

Managing cybersecurity risks and vulnerabilities is a critical activity for any robust security program. Risk management and vulnerability management are performed in tandem to help keep your network safer and more secure. What Is a Vulnerability? Managing Vulnerabilities in Your Environment.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Agriculture as a terrorist target: Time to address vulnerabilities 

Crisis Response Journal

The lack of risk assessments in the agricultural and environmental systems sectors has undoubtedly allowed them to become vulnerable to terrorist attacks, says Christoph Schroth, in a blog that will be expanded in a more detailed article in our next print By Christoph Schroth

article thumbnail

Navigating the Security Landscape: A Quick Guide to the Common Vulnerabilities and Exposures Program for Young Professionals

Security Industry Association

One impactful group in this ongoing battle is the Common Vulnerabilities and Exposures Program (CVE). Spearheaded by the MITRE Corporation, CVE is a crucial framework for identifying and managing vulnerabilities across various systems. Risk mitigation: Identifying vulnerabilities is the first step towards mitigating risks.

article thumbnail

Data Resilience: The Key to AI and Cybersecurity

Solutions Review

This article originally appeared on Solutions Review’s Insight Jam , an enterprise IT community enabling the human conversation on AI. Similarly, effective cybersecurity measures depend on the availability of accurate and up-to-date data to identify threats, analyze vulnerabilities, and respond to incidents.

article thumbnail

How The Development Of A Crisis Response Program Strengthens Resilience Management

Castellan

Article Originally Published on Forbes in May 2022. Proactive Treatment Of Vulnerabilities. Read the full article on Forbes. A large part of sustainability is preventing and overcoming disruptions. This starts with understanding and inspecting the organization’s readiness posture, as well as its ability to respond to disruption.

article thumbnail

The CISOs Guide to Storage & Backup Cyber Resiliency

Solutions Review

Solutions Review’s Contributed Content Series is a collection of contributed articles written by thought leaders in enterprise technology. That state of affairs is likely to remain until the inherent risk posed by vulnerable storage and backup systems is addressed. This is a misconception, and a dangerous one at that.