Friends of OpenJDK Today

Quick Fire Java: Java After Log4j

March 31, 2022

Author(s)

  • Jadon Ortlepp profile
    Jadon Ortlepp

    Digital Marketing Coordinator working for Payara who has been involved in the Java space since 2017. Very much enjoys collaborating on projects and events with other individuals and organisations. Including ... Learn more

In this episode of the Quick Fire Java video series, Rudy De Busscher and Priya Khaira-Hanks discuss Log4j, security processes and prioritization, and how Payara dealt with the vulnerability.

All in a concise 10-minute video!

The Log4j vulnerability, Log4Shell, was disclosed in early December 2021 and the repercussions have been far-reaching.

Rudy explains more about what this actually means and about the wider implications of the incident. He also responds to BreachQuest's Jake Williams for Threatpost, who claimed "being exploited through an internet-facing system running vulnerable log4j at this point is a leadership failure, not a technical one."

Watch the video to find out whether Rudy agrees... 🙂

Topics:

Related Articles

View All

Author(s)

  • Jadon Ortlepp profile
    Jadon Ortlepp

    Digital Marketing Coordinator working for Payara who has been involved in the Java space since 2017. Very much enjoys collaborating on projects and events with other individuals and organisations. Including ... Learn more

Comments (0)

Your email address will not be published. Required fields are marked *

Highlight your code snippets using [code lang="language name"] shortcode. Just insert your code between opening and closing tag: [code lang="java"] code [/code]. Or specify another language.

Save my name, email, and website in this browser for the next time I comment.

Subscribe to foojay updates:

https://foojay.io/feed/
Copied to the clipboard