with
Matt Johnson
(Palo Alto Networks)
,
Stephen Giguere
(Palo Alto Networks)
,
Matt McLimans
(Palo Alto Networks)
The log4shell attack was unique in its complexity, and as a remote code execution attack, incredibly risky should such a vector play out. In this lab we’ll explore the anatomy of how this attack vector works and from that learning experience, count that ways that we can defend against it and others like it in the future.
Click the blue “Learn more” button above to tap into special offers designed to help you implement what you are learning at Google Cloud Next 25.