<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

CyberSaint's Response to the Log4j Vulnerability

down-arrow

Members of the CyberSaint Community,

My name is Padraic O’Reilly, the Chief Product Officer of CyberSaint. In light of the impacts of the Log4j vulnerability on the greater digital business ecosystem, I thought it most effective to pen an open letter to our community members. As a cyber and IT risk management company, we take vulnerabilities like Log4j very seriously and want to address concerns regarding its impact on CyberSaint.

What is Log4j?

Log4j is a ubiquitous open-source Java-based ​​logging utility widely used by enterprise applications and cloud service providers. The ​​Cybersecurity and Infrastructure Security Agency (CISA) discovered a serious vulnerability in Log4j. The vulnerability was scored a 10 by NIST, making it a critical issue to services that use Java and can afford hackers a method to gain high-level access to systems.

Does it affect CyberSaint?

Our solutions are not affected by the security vulnerability described in CVE-2021-44228. While we do employ Java, we do not use the Apache Log4j library in any of our dependencies.

What has CyberSaint done?

We have taken the following steps:

  1. Manually check our dependencies and verify we do not have the affected log4j jar
  2. Run the CyberStrong docker image through scanners, which detect the affected log4j vulnerability
  3. Verify with our vendors that handle customer data whether they have been affected by the log4j vulnerability. So far none have been.

While we do not use the affected jar file, we routinely patch and update to the latest versions for all of our software components. We have found that current deployments of CyberStrong are not vulnerable and no action is required at this time. We will continue to keep up to date with the packages used within CyberStrong and the java version that we employ.

Next steps

The CyberSaint team continues to stay vigilant as new vulnerabilities emerge and ensure that customer and partner data remains secure in our products. We are committed to maintaining the highest level of security.

If you are a CyberSaint customer and have any further questions, please contact your CSM.

Thank you and happy holidays,

Padraic O’Reilly, CPO, CyberSaint

You may also like

Why You Need CIS Controls for ...
on June 17, 2022

The Center for Internet Security (CIS) is a non-profit organization that helps public sectors and private sectors improve their cybersecurity. The organization aims to help small, ...

Small Business Cybersecurity ...
on June 15, 2022

To achieve peace of mind in the modern threat landscape, small business owners must have a solid security strategy and budget in place. VIPRE’s SMB Security Trends report state ...

Do Small Businesses and Startups ...
on June 10, 2022

Did you know that about 60% of small businesses shut down within 6 months by falling victim to a data breach or cyber-attack, where the average global breach cost hovers at $3.62 ...

A Pocket Guide to ISO 27001
on June 9, 2022

Let’s begin with the complete title of what’s referred to as ISO 27001. It is officially known as “ISO/IEC 27001." If you're looking to have your company certified, you'll need to ...

Benefits Of An Automated Security ...
on June 6, 2022

Proactive recognition, remediation, and mitigation of security threats are rising challenges for global businesses today. Security risk assessment is an integral part of this ...

Kyndall Elliott
The Top 5 Automated Risk ...
on June 1, 2022

Automated risk assessment tools help you assess information security risks and related metrics in real-time based on the available data internally and externally. Connecting the ...