Home Resources From the Trenches: Protecting Against Distributed Log4j Attacks From the Trenches: Protecting Against Distributed Log4j Attacks On-Demand Webinar Last December, the Log4j vulnerability took the cyber world by storm. Within days, thousands of attacks had targeted unsuspecting organizations that scrambled to plug the holes and avoid carnage. While the initial surge of action seems to have died down for the moment, security teams should understand that they aren’t out of the woods yet. The long-term ramifications are drastic, and could affect every facet of a company’s digital footprint and supply chain. Join us for a fireside chat with BlueVoyant’s CISO, Sadiq Khan, and Head of Third-Party Risk, Adam Bixler, as they discuss how the Log4j vulnerability could change the landscape for security practitioners going forward and how BlueVoyant is prepared to respond to attacks leveraging it. They’ll provide expert insights into: How security teams should react to a potential attack What BlueVoyant has done to help customers mitigate Log4j-related attacks Examples of real-life scenarios BlueVoyant analysts have seen Presenters Sadiq Khan, CISO, BlueVoyant Adam Bixler, Head of Third-Party Risk, BlueVoyant Protecting Against Distributed Log4J Attacks Webinar Related reading Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now Webinar Securing the UK’s National Health Service May 23, 2022 Join this BlueVoyant and Microsoft webinar on June 29 to discover how you can create a robust and economical cyber defense environment. Register now Recommended reading Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Learn more
On-Demand Webinar Last December, the Log4j vulnerability took the cyber world by storm. Within days, thousands of attacks had targeted unsuspecting organizations that scrambled to plug the holes and avoid carnage. While the initial surge of action seems to have died down for the moment, security teams should understand that they aren’t out of the woods yet. The long-term ramifications are drastic, and could affect every facet of a company’s digital footprint and supply chain. Join us for a fireside chat with BlueVoyant’s CISO, Sadiq Khan, and Head of Third-Party Risk, Adam Bixler, as they discuss how the Log4j vulnerability could change the landscape for security practitioners going forward and how BlueVoyant is prepared to respond to attacks leveraging it. They’ll provide expert insights into: How security teams should react to a potential attack What BlueVoyant has done to help customers mitigate Log4j-related attacks Examples of real-life scenarios BlueVoyant analysts have seen Presenters Sadiq Khan, CISO, BlueVoyant Adam Bixler, Head of Third-Party Risk, BlueVoyant Protecting Against Distributed Log4J Attacks Webinar Related reading Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now Webinar Securing the UK’s National Health Service May 23, 2022 Join this BlueVoyant and Microsoft webinar on June 29 to discover how you can create a robust and economical cyber defense environment. Register now Recommended reading Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Learn more
Ransomware Why Are the Consequences of Ransomware Attacks Rarely Fully Understood? May 24, 2022 According to BlueVoyant’s ransomware research, unsuspecting victims suffer the consequences, such as layoffs, medical treatment delays, travel… Read more
Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector May 23, 2022 Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Register now
Webinar Securing the UK’s National Health Service May 23, 2022 Join this BlueVoyant and Microsoft webinar on June 29 to discover how you can create a robust and economical cyber defense environment. Register now
Webinar Protecting the Grid: The Evolving Threat Landscape and Proactive Defense in the Energy Sector Join us on June 16 as we discuss the energy grid landscape and how the industry can address risk with a proactive approach. Learn more