Accellion, Solar Winds, and Log4Shell are just a few in a long list of security vulnerabilities that have kept defenders busy around the clock. For many enterprises, remediation is difficult – or worse, non-existent – leading to compromise through vulnerabilities that are sometimes years old, even though patches are available.
Knowing the right steps to take can be tough. So how can your organization find the right way to proactively protect its applications and data from attacks exploiting past, current, and even future vulnerabilities?
The Log4Shell, Accellion, and Solar Winds vulnerabilities
The differences and similarities between these risks
Proactive strategies to mitigate past, present, and future vulnerabilities
F5 products that can be a part of an effective defense
Malcolm Heath
Sr. Threat Researcher
F5 Labs
Aaron Brailsford
Principal Security Engineer
F5
Peter Scheffler
Senior Solutions Architect
F5