• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Alston & Bird Privacy, Cyber & Data Strategy Blog

  • Home
  • Services
  • Events
  • Contacts

Log4j

FTC Releases Warning to Companies that Fail to Mitigate Log4j Vulnerability

January 5, 2022 By Alysa Austin and Privacy, Cyber & Data Strategy Team

Less than a month ago, a critical vulnerability was identified in the ubiquitous, open source Log4j tool prompting swift guidance from Cybersecurity and Infrastructure Security Agency (CISA) and other security practitioners.  Now, the Federal Trade Commission (FTC) has warned companies that it “intends to use its full legal authority” against any company that fails to […]

Filed Under: Board Governance & Cyber Risk Management, Consumer Protection/FTC, National Security & Digital Crimes, Privacy & Cyber Regulatory Enforcement Tagged With: Cybersecurity, Log4j, Vulnerability

CISA Issues Statement on Log4j Critical Vulnerability

December 13, 2021 By Kim Peretti

Log4j is a java-based tool from Apache’s open source library used for parsing logs that never seems to have made headlines before this past weekend.  Now, following the December 9th public announcement of a vulnerability in this tool, public and private sector security partners are issuing warnings about this “critical vulnerability.”  While the full scope […]

Filed Under: Board Governance & Cyber Risk Management, Crisis & Data Breach Response, National Security & Digital Crimes Tagged With: CISA, Cybersecurity, Log4j, Vulnerability

Primary Sidebar

This blog is a service of Alston & Bird’s Privacy, Cyber & Data Strategy team and focuses on key data privacy and data security issues.


Receive email notifications when new posts are added.

Receive email notifications when new posts are added.


RANSOMWARE FUSION CENTER
Click here to request access

THE DIGITAL DOWNLOAD
Click here to see the editions

PRIVACY & CYBER EVENTS
Click here to see upcoming and past events

PRIVACY & CYBER MAILINGS
Click here to sign up


Secondary Sidebar

Categories

Recent Posts

  • The FTC’s COPPA Policy Statement to Incentivize Age Verification Through a More Flexible Enforcement Approach
  • NYDFS Revises Prescriptive FAQs on Multifactor Authentication
  • Threat Actors Exploit Google’s Gemini to Accelerate Cyberattacks
  • CISA Revives CIRCIA Rulemaking
  • Genetic Goldmine or Legal Landmine? Tempus AI Confronts GIPA Exposure
Copyright © 2026 · Alston & Bird · All Rights Reserved. Privacy.