Cybersecurity researchers issue advice for critical infrastructure operators – many of who might not even know whether or where Log4j is used on the network.
Discover more resources.
Explore more resources to support you on your ICS cybersecurity journey.
Ready to put your insights into action?
Take the next steps and contact our team today.