Defending against Log4J
The Log4Shell is an internet vulnerability affecting millions of computers. It uses software called Log4j, which records all activities – or events – that take place on a computer system.
Since the legitimate use of Log4j is so widespread, it causes several serious concerns. One is that administrators often find it difficult to detect and remediate the vulnerability, and another is that hackers are still finding new ways to exploit it.
As part of our efforts to prepare your team against threats, we're offering FREE Log4j training. Learn how to defend confidently against Log4J vulnerabilities and Log4shell exploits (CVE-2021-44228 and CVE-2021-45046) using this free training module.
Getting started is simple:
NOTE: The training module link is single-use only; once you click the link, you must complete the module before exiting your browser.