log4j explained simply – what you need to know!

You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.

More Information

Simply explained for everyone: what companies should know about the log4shell vulnerability.

  • Why it is dangerous.
  • How it works.
  • How you can protect yourself.

A GoPresent/JEG production.

With the support of agilimo Consulting, HiFi extra and ROTTHEGE | WASSERMANN.

https://www.gopresent.de

https://www.agilimo.de

https://www.hifi-extra.de

https://www.rotthege.com

https://www.julius-echter-gymnasium.d…

Share this post
Facebook
Twitter
LinkedIn
XING
Email