The first step in combating the Log4j vulnerability is identifying applications in your organization that are vulnerable to this developing threat. This blog explains how Palo Alto Networks Cortex Xpanse detects security vulnerabilities in your digital attack surface by identifying makes, models, and versions of software with known problems. Contact us for a free demo to see Cortex Xpanse in action.