Hero background

Application security

Empower DevSecOps to deliver digital services faster and more confidently with Application Security.

Duplicate cases: A game-changer for Security Investigator productivity and efficiency

Read now

Reduce incident response time with case templates

Read now

Hidden indicators: Tracing the emergence of Apache Struts CVE-2024-53677

Read now

The anatomy of broken Apache Struts 2: A technical deep dive into CVE-2024-53677

Read now

Ingest and enrich AWS Security Hub findings with Dynatrace

Read now

Dynatrace Cloud Security Posture Management elevates cloud security with real-time compliance across hyperscalers

Read now

Discover the new Dynatrace Runtime Vulnerability Analytics experience

Read now

Ingest and enrich security findings delivered by Amazon EventBridge with Dynatrace

Read now

Enrich Tenable vulnerability findings with Dynatrace runtime context

Read now

New continuous compliance requirements drive the need to converge observability and security

Read now

Dynatrace KSPM: Transforming Kubernetes security and compliance

Read now

What is software composition analysis?

Read now
Press release

Dynatrace Joins the Microsoft Intelligent Security Association

Read now

2024 GigaOm Radar Report for Kubernetes Observability

Read now

Dynatrace named Cloud Security Platform of the Year in the 2024 CyberSecurity Breakthrough Awards

Read now

Enrich Amazon ECR vulnerability findings with runtime context

Read now

Generate security events from Dynatrace Security Investigator via OpenPipeline

Read now

Exposure management vs. vulnerability management: Preventing attacks with a robust cybersecurity strategy

Read now

Taming DORA compliance with AI, observability, and security

Read now

New SQL injection vulnerability in FileCatalyst Workflow

Read now

What is DORA? The application security and reliability implications of the Digital Operational Resilience Act

Read now

Third-party vulnerabilities: Prioritize CVEs to boost digital resilience

Read now

Break the silos: Enrich vulnerability findings with runtime context

Read now

Collaborate with peers in hunting security threats

Read now