Infographic: Log4Shell Vulnerability Impact by the Numbers
March 18, 2022 at 09:13 am EDT
Share
The full scope of risk presented by the Log4Shell vulnerability is something unprecedented, spanning every type of organization across every industry. Hard to find but easy to exploit, Log4Shell immediately places hundreds of millions of Java-based applications, databases, and devices at risk. Remediating this vulnerability has turned out not to be a simple, one-and-done process. Multiple detection methods are required.
Log4Shell Research Study Reveals Enterprise IT Exposure & Response
To shed a unique light on Log4Shell's impact one month after its disclosure, the Qualys Research Team analyzed anonymized security data from across its global network. This infographic reveals enterprise IT's exposure and response to Log4Shell across criteria such as the threat landscape, vulnerability trends, remediation trends, and attack patterns.
[Link]
* 30% statistic does not account for any mitigations applied
Post this infographic to your social media by using the share buttons at the bottom of the page.
To add this infographic to your blog or article, copy/paste the following:
Source: Qualys Inc.
Related
Attachments
Original Link
Original Document
Permalink
Disclaimer
Qualys Inc. published this content on 18 March 2022 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 18 March 2022 13:12:02 UTC.
Qualys, Inc. is a provider of a cloud-based platform delivering information technology (IT), security and compliance solutions. The Companyâs integrated suite of IT, security and compliance solutions delivered on Qualys' Enterprise TruRisk Platform enables its customers to identify and manage their IT and operational technology (OT) assets, collect, and analyze large amounts of IT security data, recommend, and implement remediation actions and verify the implementation of such actions. It provides its solutions through a software-as-a-service model, primarily with renewable annual subscriptions. Its cloud platform offers an integrated suite of solutions that automates the lifecycle of asset discovery and management, security and compliance assessments, and remediation for an organizationâs IT infrastructure and assets, whether such infrastructure and assets reside inside the organization, on their network perimeter, on endpoints or in the cloud.