4 practical strategies for Log4j discovery

For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within their environment. Without this understanding, any remediation efforts will be hamstrung from the get-go. Of course, this type of asset management can prove exceedingly difficult as Log4j is represented across thousands of products.For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within their environment. Without this understanding, any remediation efforts will be hamstrung from the get-go. Of course, this type of asset management can prove exceedingly difficult as Log4j is represented across thousands of products.

Read More

“Attempted cybersecurity incident” targeted Sanford Health: CEO

SIOUX FALLS, S.D. (Dakota News Now) – Sanford Health says it was targeted in a cybersecurity incident Wednesday.

Sanford Health President and CEO Bill Gassen tells Dakota News Now that the health system experienced an “attempted cybersecurity incident” and that it’s taking measures to contain the impact.

Gassen says that at this time no known patient, resident, or employee personal or financial information was compromised.

Sanford has notified federal authorities.

Read More