Privacy by design and by default means that data protection is taken into account from the design stage throughout the lifecycle of data processing. But what does it actually mean and how can the concept be built into operational processes?
As the Log4shell situation is running rampant in the world, we at Nixu, among all the others, are developing ways to detect malicious activity within our environments. Endpoint Detection and Response agents are able to detect potentially malicious activity after the Java process has been instructed to do the bidding of the malicious attacker.
The log4j vulnerability has been a rude awakening to many small and large organizations, and IT administrator teams are working hard to patch the newly-discovered vulnerability known as Log4Shell. The magnitude of this discovery is significant, as it affects millions of devices across the internet. The vulnerability is found in Log4j, which is a public computer software library used by Java-based apps and online services to log error messages to a log file.