, , ,

5 years of external pentesting: How the Dynatrace security posture has strengthened

Over each of the past five years, the Dynatrace security team has tasked external security firms with conducting penetration tests of our SaaS and Managed components. These tests are performed to verify the effectiveness of our security controls.…
, , ,

What is DevSecOps?

Dynatrace news DevSecOps is a cross-team collaboration framework that integrates security into DevOps processes from the start rather than waiting to address security in a separate silo. With an integrated DevSecOps approach, organizations can…
, , ,

How Dynatrace protects its software development and delivery life cycle against supply chain attacks

Recently, some organizations fell victim to a software supply chain attack, which led to loss of confidential data. This article explains what a software supply chain attack is, and how Dynatrace protects its customers against such attacks by…
, , ,

New – Multi-Factor Authentication with WebAuthn for AWS SSO

Starting today, you can add WebAuthn as a new multi-factor authentication (MFA) to AWS Single Sign-On, in addition to currently supported one-time password (OTP) and Radius authenticators. By adding support for WebAuthn, a W3C specification…
, , , , , , , ,

New – Using Amazon GuardDuty to Protect Your S3 Buckets

As we anticipated in this post, the anomaly and threat detection for Amazon Simple Storage Service (S3) activities that was previously available in Amazon Macie has now been enhanced and reduced in cost by over 80% as part…
, , , , ,

Amazon Detective – Rapid Security Investigation and Analysis

Almost five years ago, I blogged about a solution that automatically analyzes AWS CloudTrail data to generate alerts upon sensitive API usage. It was a simple and basic solution for security analysis and automation. But demanding AWS customers…
, , , , ,

Additional security for Synthetic monitor credentials with the new credential vault

With Dynatrace Synthetic Monitoring, you can easily monitor the availability and performance of your applications as experienced by your customers around the world and around the clock. Your applications usually require authentication and authorization…
, , , , , ,

Easily check configuration changes or environment sign ins with the new Audit logs API

Transparency and traceability of configuration changes are key to enabling multiple teams to collaborate effectively. Audit logs are crucial for tracking changes and security-relevant events. Until now, audit logs were only available…
, , ,

What’s new in access management?

This blog describes upcoming Anypoint Platform features within access management, mapping them to the most common use cases and customer needs.  We’re extremely excited to take access management to the next level with simple and…
, , , , , , ,

New – VPC Ingress Routing – Simplifying Integration of Third-Party Appliances

When I was delivering the Architecting on AWS class, customers often asked me how to configure an Amazon Virtual Private Cloud to enforce the same network security policies in the cloud as they have on-premises. For example, to scan all ingress…