WAFs and the Log4j Vulnerability
Understanding the OSI model and how WAFs work
This is a brief hiatus from my series of blog posts on software security. My mind tends to wander and I write whatever appeals to me on a particular day. I’ll get back to that other series of blog posts shortly.
I was inspired to write this post in response to a tweet someone made about the log4j…