Your Top Five Cyber Risks in Five Clicks with the Free Cyber Risk Analysis

FREE RISK ANALYSIS
Request Demo

CyberSaint's Response to the Log4j Vulnerability

down-arrow

Members of the CyberSaint Community,

My name is Padraic O’Reilly, the Chief Product Officer of CyberSaint. In light of the impacts of the Log4j vulnerability on the greater digital business ecosystem, I thought it most effective to pen an open letter to our community members. As a cyber and IT risk management company, we take vulnerabilities like Log4j very seriously and want to address concerns regarding its impact on CyberSaint.

What is Log4j?

Log4j is a ubiquitous open-source Java-based ​​logging utility widely used by enterprise applications and cloud service providers. The ​​Cybersecurity and Infrastructure Security Agency (CISA) discovered a serious vulnerability in Log4j. The vulnerability was scored a 10 by NIST, making it a critical issue to services that use Java and can afford hackers a method to gain high-level access to systems.

Does it affect CyberSaint?

Our solutions are not affected by the security vulnerability described in CVE-2021-44228. While we do employ Java, we do not use the Apache Log4j library in any of our dependencies.

What has CyberSaint done?

We have taken the following steps:

  1. Manually check our dependencies and verify we do not have the affected log4j jar
  2. Run the CyberStrong docker image through scanners, which detect the affected log4j vulnerability
  3. Verify with our vendors that handle customer data whether they have been affected by the log4j vulnerability. So far none have been.

While we do not use the affected jar file, we routinely patch and update to the latest versions for all of our software components. We have found that current deployments of CyberStrong are not vulnerable and no action is required at this time. We will continue to keep up to date with the packages used within CyberStrong and the java version that we employ.

Next steps

The CyberSaint team continues to stay vigilant as new vulnerabilities emerge and ensure that customer and partner data remains secure in our products. We are committed to maintaining the highest level of security.

If you are a CyberSaint customer and have any further questions, please contact your CSM.

Thank you and happy holidays,

Padraic O’Reilly, CPO, CyberSaint

You may also like

How to Streamline Your ...
on December 24, 2024

Many industry regulations require or promote cybersecurity risk assessments to bolster incident response, but what is a cybersecurity risk assessment? For example, cyber risk ...

Alison Furneaux
CISO Reporting Structure ...
on December 23, 2024

The Changing Landscape of CISO Reporting The Chief Information Security Officer (CISO) role has evolved dramatically in recent years. Traditionally reporting to the Chief ...

How to Leverage the FAIR Model ...
on December 19, 2024

In light of the Colonial Pipeline cyberattack, measuring risk is on everyone’s minds. However, quantifying risk is often not easy. So many factors go into determining and ...

Kyndall Elliott
How to Effectively Communicate Top ...
on December 9, 2024

Effective cybersecurity reporting is more important than ever for CISOs, CIOs, and other security leaders in today's complex threat landscape. Reporting isn’t just about sharing ...

November Product Update
on November 27, 2024

The CyberSaint team has been working hard to deliver the latest updates to streamline and improve our customers’ user experience and address their top-of-mind challenges. We’re ...

Putting the “R” back in GRC - ...
on December 5, 2024

Cyber GRC (Governance, Risk, and Compliance) tools help organizations manage and streamline their cybersecurity, risk management, and compliance processes. These tools integrate ...