Remove Blog Remove Presentation Remove Strategy Remove Systems
article thumbnail

Why vulnerability management enhances your cloud application security strategy

Dynatrace

Without a centralized approach to vulnerability management, DevSecOps teams waste time figuring out how a vulnerability affects the production environment and which systems to fix first. The post Why vulnerability management enhances your cloud application security strategy appeared first on Dynatrace blog. Contextual insight.

Strategy 210
article thumbnail

Black Friday traffic exposes gaps in observability strategies

Dynatrace

“Organizations need to prepare for both expected and unexpected demand, not only for the services that their customers and users rely on today but for the services being developed for tomorrow,” he wrote in a blog on Black Friday traffic. The company did a postmortem on its monitoring strategy and realized it came up short.

Traffic 181
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Migrating Critical Traffic At Scale with No Downtime?—?Part 2

The Netflix TechBlog

This is where large-scale system migrations come into play. Our previous blog post presented replay traffic testing — a crucial instrument in our toolkit that allows us to implement these transformations with precision and reliability. Canaries and sticky canaries are valuable tools in the system migration process.

Traffic 279
article thumbnail

RSA guide 2024: AI and security are top concerns for organizations in every industry

Dynatrace

At this year’s RSA conference, taking place in San Francisco from May 6-9, presenters will explore ideas such as redefining security in the age of AI. As organizations train generative AI systems with critical data, they must be aware of the security and compliance risks. ’ and ‘How compliant are we? What is generative AI?

article thumbnail

Accelerate and empower Site Reliability Engineering with Dynatrace observability

Dynatrace

This intricate allocation strategy can be categorized into two main domains. In this blog post, we’ll delve deeper into these categories to gain a comprehensive understanding of their significance and the challenges they present. These tasks collectively ensure uninterrupted production service.

article thumbnail

Black Hat 2023: Pairing causal AI and generative AI for cybersecurity threats

Dynatrace

They can also use generative AI for cybersecurity, write prototype code, and implement complex software systems. Pairing generative AI with causal AI One key strategy is to pair generative AI with causal AI , providing organizations with better-quality data and answers as they make key decisions. What is DevSecOps?

DevOps 175
article thumbnail

Black Hat 2022 highlights zero-day attacks as key theme

Dynatrace

Malicious attackers have gotten increasingly adept at identifying vulnerabilities and launching attacks to exploit these weak points in IT systems. The centrality of zero-day attacks suggests that organizations need a better strategy to fend off these attacks. – blog. Security as code demands proactive DevSecOps – blog.

DevOps 130