Skip to main content

I addition to the blog-post about LogPoint and Log4j update here: https://www.logpoint.com/en/blog/status-on-log4j-vulnerability-in-logpoint/ - LogPoint also created another Blog-Post on how a combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and put a stop to the attack

Read it here: https://www.logpoint.com/en/blog/detecting-log4shell-requires-more-than-just-a-siem/

 

Regards,

Brian Hansen, LogPoint

VP, Customer Success

 

 

 

 

Be the first to reply!

Reply