Detecting Log4Shell requires more than just a SIEM

0

I addition to the blog-post about LogPoint and Log4j update here: https://www.logpoint.com/en/blog/status-on-log4j-vulnerability-in-logpoint/ - LogPoint also created another Blog-Post on how a combination of tools and a defense-in-depth mindset will give organizations the ability to detect post-compromise activity and put a stop to the attack

Read it here: https://www.logpoint.com/en/blog/detecting-log4shell-requires-more-than-just-a-siem/

Regards,

Brian Hansen, LogPoint

VP, Customer Success

Share This Post:

Please sign in to leave a comment.