Do you want your ad here?

Contact us to get your ad seen by thousands of users every day!

[email protected]

Quick Fire Java: Java After Log4j

  • March 31, 2022
  • 2134 Unique Views
  • < 1 min read

In this episode of the Quick Fire Java video series, Rudy De Busscher and Priya Khaira-Hanks discuss Log4j, security processes and prioritization, and how Payara dealt with the vulnerability.

All in a concise 10-minute video!

The Log4j vulnerability, Log4Shell, was disclosed in early December 2021 and the repercussions have been far-reaching.

Rudy explains more about what this actually means and about the wider implications of the incident. He also responds to BreachQuest's Jake Williams for Threatpost, who claimed "being exploited through an internet-facing system running vulnerable log4j at this point is a leadership failure, not a technical one."

Watch the video to find out whether Rudy agrees... 🙂

Do you want your ad here?

Contact us to get your ad seen by thousands of users every day!

[email protected]

Comments (0)

Highlight your code snippets using [code lang="language name"] shortcode. Just insert your code between opening and closing tag: [code lang="java"] code [/code]. Or specify another language.

No comments yet. Be the first.

Subscribe to foojay updates:

https://foojay.io/feed/
Copied to the clipboard