Insights that
deliver.

What is LOG4J? Best Practices to Minimize Exposure

In December 2021, a major cybersecurity bug was detected in Log4j, a widely used piece of open-source logging software provided by a leading middleware provider (Apache Software Foundation). Although the security hole has been rapidly patched by most major companies, the vulnerability could persist for years as previously infiltrated computer networks are compromised. Log4j software […]

Have I Been Pwned? Best Practices for Email Security

HaveIBeenPwned.com (“HIBP”) is a website that aggregates breaches and enables users to identify where their personal data has been exposed. The word “pwned” has its origins in video game culture and is typically used to imply someone has been controlled or compromised by a breach. A breach is an incident where data is or has […]