article thumbnail

Log4j 2 Vulnerability: Identifying and Minimizing Production Risk

Dynatrace

The National Vulnerability Database describes the exploit here. As organizations work to find the usage of this library in their applications, they should focus on three criteria to prioritize the fix in their environment: Public Internet Exposure – Are the Java processes using these libraries directly accessible from the internet?

Java 241
article thumbnail

Log4Shell vulnerability: Identifying and minimizing production risk

Dynatrace

The National Vulnerability Database describes the vulnerability here. As organizations work to find the usage of this library in their applications, they should focus on three criteria to prioritize the fix in their environment: Public Internet Exposure – Are the Java processes using these libraries directly accessible from the internet?

Java 187
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Ultimate Guide to Open Source Databases

Percona

The use of open source databases has increased steadily in recent years. Past trepidation — about perceived vulnerabilities and performance issues — has faded as decision makers realize what an “open source database” really is and what it offers. What is an open source database?

article thumbnail

Bring Your Own Cloud (BYOC) vs. Dedicated Hosting at ScaleGrid

Scalegrid

Where you decide to host your cloud databases is a huge decision. But, if you’re considering leveraging a managed databases provider, you have another decision to make – are you able to host in your own cloud account or are you required to host through your managed service provider? Where to host your cloud database?

Cloud 242
article thumbnail

Application vulnerabilities: Important lessons from the OWASP top 10 about application security risks

Dynatrace

For this, best practices would be to segregate commands from data, use parameterized SQL queries, and eliminate the interpreter by using a safe application program interface, if possible. Numerous organizations offer databases of these weaknesses, such as the Snyk Intel Vulnerability Database.

article thumbnail

Segmentation Fault – A DBA Perspective

Percona

I tried to search for details related to segmentation fault on the internet and found many articles; however, it failed to quench my thirst as none of them had the answer I was looking for. In order to understand “segmentation fault,” it is a must to know the basic idea of segmentation and its implementation in C programming.

article thumbnail

Improved PHP monitoring with even less overhead!

Dynatrace

This is why PHP is such a popular programming language for web development. Here are some statistics: PHP now accounts for about 79% of the server-side programming used on the Internet. PHP-based WordPress boasts that it alone runs over one-third of the Internet (based on W3Techs statistics).