PacketWatch Log4J Article also Published on Law360

PacketWatch Log4J Article also Published on Law360

Blog | News

PacketWatch Log4J Article also Published on Law360

PacketWatch CTO Michael McAndrews recently collaborated with Squire Patton Boggs to create an article for the law firm’s Consumer Privacy World blog. The blog post focused on the recent Log4J vulnerability that has become a top cybersecurity concern for most organizations.

We learned that Law360, a prominent news service for attorneys operated by Portfolio Media (subsidiary of LexisNexus), picked up the article to share with their paid subscriber base. The article provides technical and operational guidance to companies trying to respond to the Log4J vulnerability concerns.

Law360 subscribers can read the article “A Case Study in Appropriately Responding to the Log4J Cybersecurity Vulnerability” (pdf) on the Law360 website. If you need assistance with any of the recommendations in the article, please contact us for assistance.

“This article illustrates how vulnerabilities create both technical and legal challenges for organizations. Working with Squire Patton Boggs helps PacketWatch ensure our clients get the highest level of attention on both fronts.”

Michael McAndrews Chief Technology Officer PacketWatch
Tags:
PacketWatch Log4J Article Published in National Law Review

PacketWatch Log4J Article Published in National Law Review

Blog | News

PacketWatch Log4J Article Published in National Law Review

PacketWatch CTO Michael McAndrews recently collaborated with Colin Jennings and Ericka Johnson to produce an article for the Squire Patton Boggs law firm Consumer Privacy World blog. The blog post focused on the recent Log4J vulnerability that has become a top cybersecurity concern for most organizations. Within hours, the National Law Review republished the article, and now other news and legal websites are sharing the content too.The article provides technical and operational guidance to companies trying to respond to the Log4J vulnerability concerns. In the article, they cover:
  • Technical recommendations
  • Non-technical questions business leaders should ask
  • Steps to mitigate cyber risk
If you would like to confirm that your organization is taking the appropriate steps to protect your assets, you can read “A Case Study in Appropriately Responding to the Log4J Cybersecurity Vulnerability” on Consumer Privacy World or National Law Review. If you need assistance with any of the recommendations in the article, please contact us for assistance.

“This article illustrates how vulnerabilities create both technical and legal challenges for organizations. Working with Squire Patton Boggs helps PacketWatch ensure our clients get the highest level of attention on both fronts.”

Michael McAndrews Chief Technology Officer PacketWatch
Tags: