Log4j Vulnerability Underscores a Negative Side Effect of Open Source
|

Log4j Vulnerability Underscores a Negative Side Effect of Open Source

I am not going to talk about the Log4j vulnerability and how to determine if you are impacted and how to recover. I am sure there are plenty of articles on that. In my view, the more important discussion is had by taking a hard look at the open source software model and considering the…

IT Security Alert: Drop Everything and Take Action Now

IT Security Alert: Drop Everything and Take Action Now

Last week, several news sites that focus on IT Security reported that data dumps have been found on the Dark Net with over 3 billion user account credentials. Some are calling it “COMB” which stands for Compilation of Many Breaches. It is believed that this large number of breached account credentials was not the result…