article thumbnail

Tech Transforms podcast: Energy department CIO talks national cybersecurity strategy

Dynatrace

They’re really focusing on hardware and software systems together,” Dunkin said. The principle of “security by design” plays a major role in these efforts. The DOE has designated a national lab to implement security by design and improve understanding. How can we learn from that and how can we help you with some of your other problems?

Energy 225
article thumbnail

AIOps strategy central to proactive multicloud management

Dynatrace

This article includes key takeaways on AIOps strategy: Manual, error-prone approaches have made it nearly impossible for organizations to keep pace with the complexity of modern, multicloud environments. AIOps strategy at the core of multicloud observability and management. Exploring keys to a better AIOps strategy at Perform 2022.

Strategy 231
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Advance DevSecOps practices with a vulnerability management strategy

Dynatrace

In this preview video for Dynatrace Perform 2022, I talk to Ajay Gandhi, VP of product marketing at Dynatrace, about how adding a vulnerability management strategy to your DevSecOps practices can be key to handling threats posed by vulnerabilities. ?. For our complete? Perform 2022 conference coverage , check out our guide.

Strategy 211
article thumbnail

Why vulnerability management enhances your cloud application security strategy

Dynatrace

Modern software development requires DevSecOps approaches that shift right into production in addition to shift-left efforts in development. As organizations increasingly rely on cloud-based applications and open-source software to quicken the pace of innovation, teams face an even greater challenge to release apps fast and securely.

Strategy 229
article thumbnail

Storage Strategies for PostgreSQL on Kubernetes

Percona

There are a wealth of options on how you can approach storage configuration in Percona Operator for PostgreSQL , and in this blog post, we review various storage strategies — from basics to more sophisticated use cases. The way it is consumed is through regular storage classes and deserves a separate blog post.

Storage 102
article thumbnail

Why software supply chain attacks are increasing

Dynatrace

Software supply chain attacks emerge in full force. But today, software supply chain attacks are a key factor in the global movement of goods. Additionally, a global study of 1,000 CIOs indicated that 82% say their organizations are vulnerable to cyberattacks targeting software supply chains. Dynatrace news.

Software 198
article thumbnail

RSA guide 2024: AI and security are top concerns for organizations in every industry

Dynatrace

Therefore, these organizations need an in-depth strategy for handling data that AI models ingest, so teams can build AI platforms with security in mind. Tech Transforms podcast: It’s time to get familiar with generative AI – blog Generative AI can unlock boundless innovation. Check out the resources below for more information.