• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: Log4j

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 145: The Log4j Vulnerability

Ollie Whitehouse, chief technology officer at NCC Group, joins the podcast to talk about the Log4j bug and what makes it so critical.

December 16, 2021 Zachary Comeau Leave a Comment

Ollie Whitehouse, chief technology officer at NCC Group, joins the podcast to talk about the Log4j bug and what makes it so critical.

Read More

Log4j, Older Vulnerabilities, CISA KEV

Which Products Are Impacted By the Log4j Vulnerability?

CISA and other governments' agencies are maintaining updated lists of vendors with software impacted by the Log4j vulnerability.

December 15, 2021 Zachary Comeau Leave a Comment

Multiple governments have released a long list of IT vendors and their products that are impacted by the Log4j vulnerability, including the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Dutch National Cyber Security Centrum (NCSC) The two agencies are maintaining running lists of vendors impacted by the vulnerability on their respective GitHub repositories, […]

Read More

Log4j Vulnerability

What You Need To Know About The Log4j Vulnerability

We asked Paul Ducklin, principal research scientist at cybersecurity firm Sophos, about what the Log4j vulnerability means for IT pros.

December 13, 2021 Zachary Comeau Leave a Comment

The Log4J vulnerability discovered late last week continues to make lives extremely busy for IT and cybersecurity professionals and software vendors rush to investigate if their products are vulnerable and push patches out to customers while those customers investigate the hundreds of apps their organization uses to determine how exposed they are. The widely used […]

Read More

Fortinet Vulnerability, Fortigate

Critical Vulnerability in Java Logging Library Log4j Is Being Actively Exploited

The Java logging library vulnerability is impacting widely used software, with more likely to be affected, security experts say.

December 10, 2021 Zachary Comeau Leave a Comment

Security researchers have discovered a new easy-to-exploit zero-day vulnerability in the ubiquitous Java logging library Apache Log4j 2 that could give attackers the ability to execute unauthenticated remote code execution. The U.S. Cybersecurity and Infrastructure Security Agency, along with dozens of cybersecurity providers, have issued alerts and advisories of the vulnerability, CVE-2021-44228, which they warn […]

Read More

Crowdstrike Charlotte AI

CrowdStrike Launches Virtual Security Assistant Charlotte AI

CrowdStrike wants its new generative AI tool Charlotte AI to make IT and security professionals more efficient and narrow the skills gap.

May 31, 2023 Zachary Comeau Leave a Comment

CrowdStrike is launching a private customer preview of its own generative AI solution which it calls Charlotte AI, essentially an AI assistant for the company’s CrowdStrike Falcon platform designed to help any user of the platform become a power user. According to the Austin, Texas-based cybersecurity giant, Charlotte AI lets customers ask natural language questions […]

Read More

VMware EXSi security

CrowdStrike: VMware ESXi in the RaaS Crosshairs

Cybersecurity researchers are noting an uptick in Ransomware-as-a-Service groups targeting VMware ESXi vSphere hypervisors.

May 15, 2023 Zachary Comeau Leave a Comment

Cyberattacks are continuing to target VMware ESXi vSphere hypervisors, with cybersecurity firm CrowdStrike reporting today that ransomware-as-a-service (RaaS) platforms are increasingly being leveraged to deploy Linux versions of ransomware tools. According to the cybersecurity giant, these tools are specifically designed to affect VMware’s ESXi vSphere hypervisor. The company’s research into these kind of attacks date […]

Read More

Cybersecurity testing, penetration testing, cyber threats

Is Your Organization Testing Against the Right Cyber Threats?

New research shows that organizations are testing against cyber threats in the headlines rather than attacks they're more likely to face.

April 12, 2023 Zachary Comeau Leave a Comment

Ransomware, supply chain attacks and nation-state threat actors have grabbed mainstream headlines in recent years, and organizations are largely recognizing that they must invest more in cybersecurity to defend against those emerging techniques. However, new research shows that some organizations are prioritizing defending against those trending, newsworthy threats at the expense of the threats actually […]

Read More

Log4j, Older Vulnerabilities, CISA KEV

Older, Unpatched Vulnerabilities Are Still Wreaking Havoc

Older vulnerabilities that remain unpatched are still the primary vehicle for cyberattacks, Tenable report finds.

February 28, 2023 Zachary Comeau Leave a Comment

Older vulnerabilities for which patches have already been made available by the vendor are still the primary vehicle for cyberattacks, suggesting that organizations are still behind in practicing good cyber hygiene, according to new data from Tenable. The Columbia, M.D.-based provider of vulnerability management software finds in its 2022 Threat Landscape Report that the number […]

Read More

Top IT stories 2022

Our Top IT Stories From 2022

Hybrid work, cybersecurity, cloud computing, recession, and new products and services highlight this year's top IT stories.

December 29, 2022 Zachary Comeau Leave a Comment

2022 was a very busy year for IT professionals as they grappled with new trends, technologies, tools, workplace models, cyberattacks and more while they helped their organization remain productive and secure. We looked back at our coverage to find common trends in our content to bring you our top 10 stories from this past year.  […]

Read More

NSA Programming Languages

How To Protect Your Organization from Cyberattacks Before The Holidays

IT and security pros should take extra steps to protect their organization from cyberattacks this holiday season, White House, CISA urge.

December 19, 2022 Zachary Comeau Leave a Comment

Editor’s note: This article was originally published last year, but the main points are still relevant today as we head into another holiday break. Review these tips and recommendations to keep your organization safe and secure this year.  With the holidays approaching, federal officials are again warning organizations of all sizes to be on the […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Interim pages omitted …
  • Page 7
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.