article thumbnail

InfoSec 2022 guide: How DevSecOps practices drive organizational resilience

Dynatrace

Open source code, for example, has generated new threat vectors for attackers to exploit. A case in point is Log4Shell, which emerged in late 2021 and exposed open source libraries to exploitation. Dynatrace introduces automatic vulnerability management for PHP open source scripting language – blog.

article thumbnail

RSA 2022 guide: DevSecOps transformation with runtime vulnerability management

Dynatrace

In addition, as businesses of all kinds adopt cloud-native and open source technologies, their environments become more flexible. As a result, while cloud architecture has enabled organizations to develop applications iteratively, it also increased exposure to vulnerabilities. At RSA 2022 , the theme is Transform.

Strategy 227
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

What Is Istio Ambient Mesh?

DZone

Istio, an open-source and widely used service mesh, is used to manage network and security for cloud-native applications. Istio Ambient Mesh Architecture Istio service mesh is a powerful software to enable zero trust by enabling authentication, authorization, and audit using mTLS and identity controls.

article thumbnail

Kubernetes in the wild report 2023

Dynatrace

Kubernetes moved to the cloud in 2022. Open-source software drives a vibrant Kubernetes ecosystem. Kubernetes moved to the cloud in 2022. In 2022, Kubernetes became the key platform for moving workloads to the public cloud. Likewise, the share of cloud-hosted clusters increased from 31% in 2021 to 45% in 2022.

article thumbnail

Black Hat 2022 highlights zero-day attacks as key theme

Dynatrace

Zero-day attacks are a key theme at Black Hat 2022 , a security conference taking place August 6-11 in Las Vegas. In modern cloud-native environments, which rely on microservices architectures, application teams that are responsible for innovation face some dilemmas. Runtime vulnerability management: Staying ahead of cyberattacks.

DevOps 130
article thumbnail

RSA Guide 2023: Cloud application security remains core challenge for organizations

Dynatrace

Cloud application security remains challenging because organizations lack end-to-end visibility into cloud architecture. As organizations migrate applications to the cloud, they must balance the agility that microservices architecture brings with the complexity and lack of transparency that can also come with it.

Cloud 189
article thumbnail

USENIX SREcon APAC 2022: Computing Performance: What's on the Horizon

Brendan Gregg

It was a great privilege. ## SREcon 2023 CFP Tech moves fast, however, and I have little time to reflect on 2022 when there's 2023 to plan! And now, helping bring USENIX conferences to Australia by giving the first keynote: I could not have scripted or expected it. The call for participation ends on March 2nd 23:59 SGT!