Dan O’Brien Chief Customer Officer, is responsible for Presidio’s comprehensive portfolio of technology capabilities including the development of offerings, strategic vendor alignment, presales and solutions architects as well as strategic acquisitions. Prior to joining Presidio in 2021, he was SVP of Global Commercial Presales at EMC where he started his career as a Hardware Engineer and rapidly progressed through their presales engineering organization holding various leadership and strategy roles. Dan holds a Bachelor’s degree in Electrical and Computer Engineering from Worcester Polytechnic Institute.
Presidio
On Dec. 9, 2021, a remote code execution (RCE) vulnerability in the popular Java-based logging package Log4j was disclosed. Submitting a specially crafted request to a vulnerable system allows an attacker to download and execute a malicious payload to perform additional functions such as data exfiltration, diverting funds, performing surveillance, or disrupting service. What many experts fear now is that the bug could be used to encrypt data and due to the discovery of this exploit being so recent, there are still many servers, both on-premises and within cloud environments, that have yet to be patched. Scanning activity for CVE-2021-44228 has actively begun on the internet with the intent of seeking out and exploiting unpatched systems. Apache Log4j versions <= 2.15.0 rc1 are vulnerable.
Organizations Can Now Predict, Identify, Protect, Detect, and Respond to Ransomware…
Automated cybersecurity defense and industry-leading threat intelligence is easily available…