Confidently present your OT cybersecurity strategy to the board with tips from Rob Lee and Koch's Philip Ellender

Skip to main content

Log4j flaw could be a problem for industrial networks ‘for years to come’

Cybersecurity researchers issue advice for critical infrastructure operators – many of who might not even know whether or where Log4j is used on the network.

Discover More Resources Using Keyword Tags

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.


Making Sense of Cybersecurity


Right Arrow

Ready to put your insights into action?

Take the next steps and contact our team today.