Remove news log-auditing-and-log-forensics
article thumbnail

Black Hat 2023: Pairing causal AI and generative AI for cybersecurity threats

Dynatrace

But as the Black Hat 2023 agenda indicates, generative AI also introduces new security risks. This combined approach provides reliable answers for two key purposes,” wrote Dynatrace CTO Bernd Greifeneder in a May 2023 blog post. Developers use generative AI to find errors in code and automatically document their code.

DevOps 187
article thumbnail

AWS re:Invent 2023 guide: Generative AI takes a front seat

Dynatrace

While technologies have enabled new productivity and efficiencies, customer expectations have grown exponentially, cyberthreat risks continue to mount, and the pace of business has sped up. The first goal is to demonstrate how generative AI can bring key business value and efficiency for organizations.

AWS 211
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Speed up your security investigations with DPL Architect

Dynatrace

This tool lets you quickly extract typed fields from unstructured text (such as log entries) using the Dynatrace Pattern Language (DPL), enabling you to extract timestamps, determine status codes, identify IP addresses, or work with real JSON objects. in our logs within the last year?” The string 40.30.20.1 ip=40.30.20.1 ip=40.30.20.1

Speed 209
article thumbnail

TTP-based threat hunting with Dynatrace Security Analytics and Falco Alerts solves alert noise

Dynatrace

In this blog post, we’ll use Dynatrace Security Analytics to go threat hunting, bringing together logs, traces, metrics, and, crucially, threat alerts. Not only are cyberattacks increasing, but they’re also becoming more sophisticated, with tools such as  WormGPT  putting generative AI technology in the hands of attackers.

Analytics 198
article thumbnail

RSA Guide 2023: Cloud application security remains core challenge for organizations

Dynatrace

As organizations develop new applications, vulnerabilities will continue to emerge. Today’s organizations face increasing pressure to keep their cloud-based applications performing and secure. Cloud application security remains challenging because organizations lack end-to-end visibility into cloud architecture.

Cloud 189