Aug. 9, 2022, 1 p.m. | Derek B. Johnson

SC Magazine feed for Strategy www.scmagazine.com

An analysis released by CyCognito found a stark difference between companies that rushed to identify and close off assets that were exposed to the corrupted Apache code early, and those that did not.

asset black hat inventory log4j mitigation security security awareness vulnerability management

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium