Jan. 10, 2022, noon | Chris Stokel-Walker

Security Latest www.wired.com

The critical vulnerability is buried among endless open source code, and many cyber experts are stumped.

cyberattacks and hacks cybersecurity fast ftc hacking log4j security vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA