The past few weeks left IT professionals overwhelmed as organizations scrambled to assess if they were vulnerable to threats posed by the Log4Shell vulnerability. As if that weren’t enough of a challenge over the holidays, more Log4j CVEs followed, not all of which deserved equal attention.
And Microsoft’s January Patch Tuesday flaws caused even more confusion, with the first batch of updates breaking functionality, forcing another round of updates.
Such is the predicament often faced by IT and cybersecurity professionals: Figuring out which vulnerabilities are most critical and deserve immediate attention, what can wait, and when to trust and apply an update.
The past few weeks left IT professionals overwhelmed as organizations scrambled to assess if they were vulnerable to threats posed by the Log4Shell vulnerability. As if that weren’t enough of a challenge over the holidays, more Log4j CVEs followed, not all of which deserved equal attention.
And Microsoft’s January Patch Tuesday flaws caused even more confusion, with the first batch of updates breaking functionality, forcing another round of updates.
Such is the predicament often faced by IT and cybersecurity professionals: Figuring out which vulnerabilities are most critical and deserve immediate attention, what can wait, and when to trust and apply an update.
More Stories
Leeds Talent Pool Attracts BlueVoyant’s First UK Security Operations Center
The proximity of organizations’ headquarters, like Asda’s and NHS England’s, prompted BlueVoyant to choose Leeds as the location for its...
City street lights “misbehave” after ransomware attack
The UK's Leicester City Council was thrown into chaos last month when a crippling cyber attack forced it to shut...
Dan Solove on Privacy Regulation
Law professor Dan Solove has a new article on privacy regulation. In his email to me, he writes: “I’ve been...
Security Leaders Braced for Daily AI-Driven Attacks by Year-End
Netacea research found that 93% of security leaders expect to face daily AI-driven attacks by the end of 2024, with...
Fifth of CISOs Admit Staff Leaked Data Via GenAI
One in five UK organizations have had corporate data exposed via generative AI, says RiverSafe Read More
North Korean Hackers Target Dozens of Defense Companies
North Korean hackers ran a year-long cyber-espionage campaign against South Korean defense companies Read More