FTC Log4j Recommendation: Be Proactive
By Lauren Yacono
With a successful supply chain attack against just one organization—often an unremarkable technology vendor—a criminal group can gain privileged access to the network of one (or all) of its customers.