InfoSec-Specific Executive Development for
CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive
labs to build you and your team's InfoSec skills
Log4j is an open source Java logging library that was recently found to have a vulnerability (CVE-2021-44228) allowing an attacker to take over a web server (or any device it runs on) and run commands from the device.
Download this detailed checklist for best practices to find, judge and fix Log4j exploits in your custom applications to prevent web server attacks as well as keep end users and the organization safe during the remediation process.
Complete the form and we will send a copy of the Log4j Remediation Checklist to your inbox.
We’ve received your request, and your content sample will be emailed to you shortly.
Please feel free to reach out to firstname.lastname@example.org with any questions.
Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.
Use our Global Political Crisis Response Checklist from IANS Faculty, Josh More to take a tiered approach following a global political crisis outside your local region.