article thumbnail

‘Security as code’ demands proactive DevSecOps

Dynatrace

This is known as “security as code” — the constant implementation of systematic and widely communicated security practices throughout the entire software development life cycle. Willie Hicks discussed how Dynatrace Application Security helps organizations adopt a security-as-code approach. The security challenges of DevOps.

Code 154
article thumbnail

Monitoring-as-code through Dynatrace’s Open-Source Initiative

Dynatrace

Dynatrace’s OneAgent automatically captures PurePaths and analyzes transactions end-to-end across every tier of your application technology stack with no code changes, from the browser all the way down to the code and database level. Monitoring-as-code requirements at Dynatrace.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Radically speed up your code by fixing slow or frequent garbage collection

Dynatrace

Optimize your code by finding and fixing the root cause of garbage collection problems. These details arm you with the knowledge necessary to find the respective code and remove unnecessary allocations. Any significant reduction in allocations will inevitably speed up your code. You can even look at the source code directly. .

Speed 164
article thumbnail

How architecture evolves into strategy

O'Reilly Software

A look at the roles of architect and strategist, and how they help develop successful technology strategies for business. I'm offering an overview of my perspective on the field, which I hope is a unique and interesting take on it, in order to provide context for the work at hand: devising a winning technology strategy for your business.

Strategy 100
article thumbnail

Black Hat 2023: Pairing causal AI and generative AI for cybersecurity threats

Dynatrace

Developers use generative AI to find errors in code and automatically document their code. They can also use generative AI for cybersecurity, write prototype code, and implement complex software systems. By definition, zero-day attacks take organizations by surprise. Will generative AI multiply existing attack surfaces?

DevOps 178
article thumbnail

Black Hat 2022 highlights zero-day attacks as key theme

Dynatrace

The centrality of zero-day attacks suggests that organizations need a better strategy to fend off these attacks. But they also need a better strategy to address these attacks if they have IT systems and live applications that are already compromised. Security as code demands proactive DevSecOps – blog.

DevOps 130
article thumbnail

Automated web testing – some strategies to achieve ROI?

Testsigma

With advancements in web development technologies and how complex web codes are written today, web testing was bound to walk this way sooner or later. This maintenance work is equivalent to writing new test cases, debugging some older ones, deleting some test cases, shuffling the code a bit according to the new version etc. Signup now.