article thumbnail

Log4j flaw needs immediate remediation

Network World

After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the recently disclosed vulnerability in open source Java-logging Apache Log4j software.

article thumbnail

Log4j flaw needs immmediate remediation

Network World

After nearly two years of adopting major network and security changes wrought by COVID-19 and hybrid work, weary IT network and security teams didn’t need another big issue to take care of, but they have one: Stemming potential damage from the recently disclosed vulnerability in open source Java-logging Apache Log4j software.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: Google-Wiz deal sparks questions about cloud security strategy at AWS and Microsoft

GeekWire

GeekWire File Photo / Todd Bishop) Editor’s note: This analysis is written by Christopher Budd, a tech industry veteran who previously worked at the Microsoft Security Response Center. CNAPPs provide a critical security layer to todays cloud computing. This is the kind of capability that Google bought with Mandiant.

article thumbnail

Generative AI & data: Potential in cybersecurity if the risks can be curtailed

CIO Business Intelligence

Back in 2001, as I was just entering the venture industry, I remember the typical VC reaction to a start-up pitch was, “Can’t Microsoft replicate your product with 20 people and a few months of effort, given the resources they have?” Artificial intelligence (AI) in 2023 feels a bit like déjà vu to me.

Data 342
article thumbnail

Marc Benioff rails against Microsoft’s copilot

CIO Business Intelligence

In 2001, Microsoft deactivated Clippy by default, and a few years later the unloved Office assistant disappeared from the program altogether. Let’s be real—Copilot’s a flop because Microsoft lacks the data, metadata, and enterprise security models to create real corporate intelligence.” However, Clippy was not well received.

Microsoft 278
article thumbnail

The Open Web Application Security Project (OWASP): An online community with a virtuous goal

CTOvision

One of our CTOvision Pro subscribers requested we provide more context on web based and mobile application security and referenced the good work underway by OWASP. The Open Web Application Security Project is a non-profit online community dedicated to web application security. By Bob Gourley.

article thumbnail

What Executives Should Know About Shift-Left Security

CIO Business Intelligence

Shift-left security” is the concept that security measures, focus areas, and implications should occur further to the left—or earlier—in the lifecycle than the typical phases that used to be entry points for security testing and protections. How did the term shift-left security originate?

Security 130