Palo Alto Networks

IT Compliance

From Log4j and Beyond: 3 Ways CN-Series Protects Containers

Since the Log4j vulnerability was detected in December 2021, security teams have rushed to identify and patch their vulnerable applications. Because Java is used everywhere and many applications rely on open source libraries dependent on Log4j, even applications that don't use Log4j directly may be vulnerable. Due to this vulner...

Mar 03, 2022

Subscribe to the Blog!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.