Michael talks to Timothy Wilson-Johnston, Value Chain Security Leader, Cisco
By Michael Morris, Director of Global Business Development, Endace
What did we learn from the recent Log4J 2 vulnerability? How are security holes like this changing the way organizations think about deploying enterprise software solutions?
In this episode of the Endace Packet Forensic files Michael Morris talks with Timothy Wilson-Johnston about the Log4J 2 threat and how it is being exploited in the wild.
Timothy shares his thoughts about what Log4J 2 has taught us, and why organizations need to look at the bigger picture:
- How can you better defend against vulnerabilities of this type
- Why it’s so important to closely scrutinize solutions that are deployed – and make sure you have visibility into components that might be included with those solutions
Finally, Timothy discusses the importance of evaluating security vs function and why it is critical to have software inspection and validation processes to manage third-party risk to your business. Knowing what your vendors’ standards are and implementing a structured and repeatable process for evaluating vendors and solutions, is key to improving security maturity.
Other episodes in the Secure Networks video/audio podcast series are available here.