The vulnerabilities of the Apache Log4j logging package and the attacks they’ve drawn have made one thing very clear: If you haven’t yet implemented a software inventory across your enterprise, now is the time to start evaluating and implementing such tools. Actually, a software inventory, or software asset management, is just one small subset of the overall