You are currently viewing a placeholder content from YouTube. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationSimply explained for everyone: what companies should know about the log4shell vulnerability.
- Why it is dangerous.
- How it works.
- How you can protect yourself.
A GoPresent/JEG production.
With the support of agilimo Consulting, HiFi extra and ROTTHEGE | WASSERMANN.



