These days, having an incident response plan is no longer a "nice to have." It has become crucial to create clear steps for stakeholders, external resources and more – ahead of time – so you’re prepared to manage cyberthreats and minimize the impact on business operations.
The Apache Log4j vulnerability is one of the highest priority vulnerabilities in IT history. Security and IT teams need to know how to mitigate this issue and if their current set of controls provides needed protection. Learn how Palo Alto Networks provides a full-court defense for Apache Log4j in this webinar.
A severe remote code execution (RCE) exploit surrounding Apache log4j has been identified. The Unit 42 incident response team can help you assess your potential exposure and impact to quickly investigate, contain, and recover from this threat.
Join Jen Miller-Osborn, Deputy Director for Unit 42 Threat Intelligence, to learn:
What we know about the ransomware used to attack Kaseya’s services, including attack vectors, IOCs, and other emerging attack details
Learn how you can use automation to great effect for threat intelligence. Join us for a unique perspective into how Unit 42, our global threat intelligence team, tackles threat hunting – and how automation can be used successfully for threat intelligence.