TechDay Australia - Australia's technology news network

Log4j stories

Photorealistic secure locked shipping containers digital code software java security
Azul & Chainguard partner on zero-CVE Java containers
Last week
#
devops
#
supply chain
#
apm
Azul and Chainguard have teamed up to offer zero-CVE Java containers, enhancing security and support for enterprise Java workloads with Hardened, source-built images.
Shield overlaying computer monitor with code lines symbolizing security
Azul enhances Java security detection, cutting false positives by 99%
This month
#
saas
#
devops
#
application security
Azul's new Java security tool cuts false positives by 99%, boosting detection accuracy and helping DevOps teams focus on real risks in production code.
Illustration computer server shield secure data flow java applications tech
Azul boosts Java security with improved runtime vulnerability detection
This month
#
devops
#
application security
#
apm
Azul’s Intelligence Cloud now cuts Java security false positives by up to 99%, using runtime data to boost vulnerability detection accuracy for DevOps teams.
Computer screen shield icon protection software vulnerabilities code symbols illustration
Azul unveils Java tool to cut false positives by up to 99%
This month
#
devops
#
application security
#
apm
Azul has launched a Java vulnerability tool that cuts false positives by up to 99%, improving threat detection accuracy for production environments.
Techday f 5adfefbd2352f59dbf02
Fewer than 40% of firms have full visibility over software supply
Last month
#
devops
#
supply chain
#
apm
Less than 40% of firms fully see their software supply chains amid rising security threats and new EU and US cybersecurity regulations.
Techday f 97984946163d6c6e4003
Most organisations lack visibility into software supply chains
Last month
#
devops
#
supply chain
#
apm
Fewer than 40% of organisations have full visibility into their software supply chains, exposing risks amid rising cybersecurity concerns and regulation.
Techday f ac0eb73b8ae86c63127a
NetRise launches AI tool to spot unknown software weaknesses
Wed, 30th Apr 2025
#
it in manufacturing
#
supply chain
#
risk & compliance
NetRise launches ZeroLens, an AI tool that detects undisclosed software weaknesses in compiled code, aiming to prevent cyberattacks before vulnerabilities emerge.
Techday 33b1557b7a99791b72f5
88% of companies consider ditching Oracle Java costs
Fri, 31st Jan 2025
#
devops
#
apm
#
ai
A survey by Azul reveals that 88% of enterprises are exploring alternatives to Oracle Java, citing rising costs and cloud expense concerns as key factors.
Techday 0140157319e50cf2954b
Qualys launches report to tackle tech debt & cyber risks
Wed, 10th Jul 2024
#
advanced persistent threat protection
#
cto
#
cyber threats
Qualys has launched a no-cost Tech Debt Report to help organisations identify and mitigate cyber risks from outdated technology.
Techday 67c3a1a5a5f5de6e9b38
Sonatype launches SBOM Manager to enhance software security
Mon, 8th Jul 2024
#
saas
#
partner programmes
#
supply chain
Sonatype releases its SBOM Manager, a crucial tool to help organisations track and manage software components.
Img agcpkv4gaaocymyfropl0cdr
Check Point introduces API Discovery to bolster cloud security
Thu, 23rd May 2024
#
firewalls
#
digital transformation
#
cloud security
Check Point fortifies its CloudGuard WAF with a new API Discovery feature, aiming to enhance cloud security by identifying and mitigating API vulnerabilities.
Img jjdptjst3gtcy7zyqrkrnzi5
Cato Networks reveals insecure protocols widespread in inaugural SASE report
Wed, 15th May 2024
#
firewalls
#
network security
#
casb
Cato Networks exposes systemic cybersecurity gaps in inaugural threat report, revealing insecure protocols employed across WAN by all examined organisations.
Img bhx8z7s0mmacazmvlpkmqwln
New Relic report uncovers ongoing trends in Java adoption
Wed, 1st May 2024
#
encryption
#
fintech
#
martech
New Relic's fourth annual State of the Java Ecosystem report reveals latest trends in Java development and adoption, highlighting significant growth in Java 21's uptake and shifts in preferred Java Developer Kits.
Img fnaphtzptgghc9gzbbryoj1n
Cloudflare reports 25% spike in global traffic & rise in cyber threats in 2023
Mon, 18th Dec 2023
#
hyperscale
#
public cloud
#
it automation
Cloudflare reveals a 25% surge in global internet traffic and heightened cybersecurity threats in its 2023 report.
Erin stephan
Beware the lasting legacy of the Log4j vulnerability
Mon, 18th Dec 2023
#
application security
#
open source
#
software development
Efforts to mitigate the Log4j vulnerability involve updating to patched versions of Log4j, but the process continues to be complex.
Sbom
The IT industry is stalling on SBOMs when it should be working on best practice
Tue, 24th Oct 2023
#
open source
#
software
#
it industry
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.
Gettyimages 1363253197
Microsoft Exchange and Log4j continue to be top points of compromise
Fri, 24th Mar 2023
#
mfa
#
advanced persistent threat protection
#
email security
Arctic Wolf, a global specialist in security operations, has published its annual Arctic Wolf Labs Threat Report, revealing a year of turbulence.
Gettyimages 1221761167
FortiGuard Labs reports an increase of 50% in wiper malware
Fri, 24th Feb 2023
#
malware
#
firewalls
#
ransomware
Ransomware threats remain at peak levels with no evidence of slowing down globally with new variants enabled by Ransomware-as-a-Service (RaaS).
Gettyimages 1359303694
Iran-sponsored group using GitHub to deploy custom malware
Tue, 13th Dec 2022
#
advanced persistent threat protection
#
apm
#
software development
The Secureworks Counter Threat Unit (CTU) has uncovered a subgroup of Iranian Cobalt Mirage using GitHub to store and deploy malware.
Gettyimages 922017556
Optus, Medibank – and supply chains flying under the radar
Wed, 7th Dec 2022
#
application security
#
devsecops
#
supply chain
Software supply chain attacks are becoming the biggest concern in cyber security, with organisations globally at risk.