by gcstco | Dec 28, 2021 | Blog, News
Tracking Down Log4j: Where to Start . Device42 recommends a prioritized approach to identify targets with recently discovered log4j vulnerability. Priority 1: Check public-facing serversPriority 2: Check applications with sensitive information and/or those with...
by gcstco | Dec 27, 2021 | Blog, News
Thousands of Java applications across the world are wide open to remote code execution attacks targeting the Log4j library. This post summarizes what we know so far about the Log4Shell vulnerability, how you can mitigate it, how to find it using Netsparker, and what...
by gcstco | Dec 26, 2021 | Blog, News
Germanys National Cybersecurity Agency declares red alert: Wave of attacks possibly imminent due to Log4Shell vulnerability . The remaining days before Christmas will not be relaxing ones for IT and IT security managers in companies around the world: The Log4Shell...
by gcstco | Dec 22, 2021 | Blog, News
S/4HANA and RISE: Top Takeaways From the 2021 UKISUG . By Sarah Rabett | December 15, 2021Snow Optimizer for SAPThought Leadership At the 2021 UKI SAP User Group, I joined a group of my Snow Software colleagues as we met face-to-face, spoke with other attendees about...
by gcstco | Dec 21, 2021 | Blog, News
Implementation Considerations for Industry 4.0 . in part one of our blog posts on planning for Industry 4.0, I looked at the importance for critical infrastructure providers of taking a phased approach to the challenge of securely connecting Operational...