It’s not easy managing the evolving technology needs of one of the fastest-growing cities in the United States. But over the past decade, the City of Frisco, Texas, has transformed its digital approach from a disjointed set of products to…
PODCAST: AST, DevSecOps and Developer Training – Three Essential AppSec Tools
Massive cyberattacks and breaches that originated in applications, including the recent SolarWinds breach that impacted as many as ten government agencies, and the more recent Kaseya breach which may have impacted hundreds of companies, have rightfully raised questions about application…
Six Reasons Why Getting Actionable Insights From Log Data is Impossible
This article is part of a larger piece that was originally published on the Dynatrace blog. Click HERE to read the original in its entirety. Leveraging cloud-native technologies like Kubernetes or Red Hat OpenShift in multicloud ecosystems across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud…
Three-Step Threat Modeling Process for More Secure Services
This article was originally written by Robert Reichel for the GitHub blog. To see the original article in its entirety, click HERE. One of the most effective tools for DevOps teams looking to increase the security of their applications is…