Skip links

Can we solve the zero-day threat once and for all? No, but here’s what we can do

Webinar Last December’s Log4j crisis brought the danger of zero day vulnerabilities to the front pages. But while one key flaw has been put under the microscope, does that mean the problem is over?

Sadly, the answer is no. There is no way of knowing how many other open-source apps have zero day vulns, not to mention enterprise apps and APIs.

The fact is Log4 was a wakeup call and remediating zero days is going to be an ongoing chore for security teams for the foreseeable future.

Which is why you should join this webcast, Mitigate Zero-Day Exploits, on April 26 at 5pm BST (9am PT), which doesn’t just bring together experts in the field but takes you through the methods they use.

Our own Tim Phillips will be joined by Contrast Security’s Larry Maccherone, previously head of DevSecOps at Comcast; as well as CM.com CISO Sandor Incze; security architect at Floor and Décor Darius Radford; and Joe Zanchi, lead cyber security policy and standards at Humana.

This stellar panel will explain how they grappled with the Log4Shell crisis and continue to deal with vulnerabilities whether in open-source code, enterprise web applications or APIs. And they’ll show you how to understand your open-source estate and how to keep it “close to latest”.

They’ll also explain whole-app analysis, and why this is better at finding vulnerabilities. And they’ll show you how to bock attacks short term, without having to rely on a web applications firewall.

Tapping into this cybersec brains trust is simple. Just head here, register, and we’ll remind you on the day. The spectre of zero days isn’t going away, but after this session you’ll be far better placed to tackle it.

Sponsored by Contrast Security

Source