www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability

Preview meta tags from the www.crn.com website.

Linked Hostnames

14

Thumbnail

Search Engine Appearance

Google

https://www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability

12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN

Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.



Bing

12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN

https://www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability

Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.



DuckDuckGo

https://www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability

12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN

Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.

  • General Meta Tags

    12
    • title
      12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN
    • description
      Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.
    • keywords
      Cybersecurity, Current Threats, Threat Management
    • category
      Security
    • format-detection
      telephone=no
  • Open Graph Meta Tags

    5
    • og:title
      12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN
    • og:description
      Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.
    • og:url
      https://www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability
    • og:image
      https://www.crn.com/slide-shows/security/media_1ed16df5dc6142dc20bf9184f65702e9ed10c9302.jpeg?width=1200&format=pjpg&optimize=medium
    • og:image:secure_url
      https://www.crn.com/slide-shows/security/media_1ed16df5dc6142dc20bf9184f65702e9ed10c9302.jpeg?width=1200&format=pjpg&optimize=medium
  • Twitter Meta Tags

    4
    • twitter:card
      summary_large_image
    • twitter:title
      12 Cybersecurity Vendors Susceptible To The Log4j Vulnerability | CRN
    • twitter:description
      Vulnerable Log4j code can be found in products from identity vendors like CyberArk, ForgeRock, Okta and Ping Identity, as well as SMB-focused security companies like Fortinet, SonicWall, and Sophos.
    • twitter:image
      https://www.crn.com/slide-shows/security/media_1ed16df5dc6142dc20bf9184f65702e9ed10c9302.jpeg?width=1200&format=pjpg&optimize=medium
  • Link Tags

    3
    • apple-touch-icon
      /icons/apple-touch-icon.png
    • canonical
      https://www.crn.com/slide-shows/security/12-cybersecurity-vendors-susceptible-to-the-log4j-vulnerability
    • stylesheet
      /styles/styles.css

Links

17