DZone's Upcoming Webinars | | May 1 - 1:00 PM EST | Inserting Business Logic Security Checks into DevOps Pipelines Technical security vulnerabilities, such as SQL injections, cross-site scripting, etc. come from coding errors. However, business logic vulnerabilities are due to mistakes in how the application was intended to work. Since the code was written properly, business logic vulnerabilities cannot be detected using traditional source code analysis techniques. Historically, the only way to find business logic vulnerabilities in development was via manual source code reviews, which does not scale to the pace of modern DevOps driven release cycles. Register | | May 7 - 1:00 PM EST | How to Monitor the Performance of MySQL in the Cloud When organizations deploy MySQL in the cloud, this creates challenges for database administrators. Typical concerns are determining the best database-specific settings, ensuring that databases are being correctly maintained without access to the full underlying infrastructure, configuring for high availability and disaster recovery, balancing performance and cost, and minimizing the learning curve. Register | | DZone's On-Demand Webinars | | When your monitoring tools send you alerts, how do you tell if it's the signal or just the noise? Today's companies are monitoring all areas of their business, but they're having a difficult time leveraging all that data to prevent service outages and limit downtime. Watch Now |  | Watch this webinar to hear two experts engage in a spirited discussion around DevOps vs. other methodologies, problems created and solved by DevOps, integrating security into DevOps in a practical way, and the best practices for resilient software, regardless of what you call the process. Watch Now |  | | | | |
Tidak ada komentar:
Posting Komentar