At Natsar we are dedicated to helping executives and decision-makers understand cybersecurity. This post will provide a non-technical overview of the Log4j (also known as log4shell) vulnerability and provide a resource for executives to use when talking with their IT teams or Managed Service Providers (MSPs).
Risk Management
A key component to any successful and mature Information Technology (IT) team is a disciplined change control process. Few things are more frustrating to a CIO than having a service affecting outage and not being able to immediately identify recent changes to the environment.