Recent Articles
How to use CodeStream—and shift left your observability practice
Created: - 8 minutes read - 1577 words
Your adventure in the world of observability, performance optimization, and security begins here.
In the fast-paced world of software development, the quest for smoother, more efficient applications feels like a never-ending adventure. But in this adventure, it’s not about slaying dragons or uncovering hidden treasures; it’s about ensuring your code performs seamlessly and your users are happy.
As a developer, I’ve faced the challenges of reactive observability, where we typically identify and resolve issues only after they’ve disrupted our applications.
read more
How to monitor Microsoft 365: Getting started
Created: - 9 minutes read - 1774 words
One of the most popular and widely adopted business tool suites is Microsoft 365 (previously known as Microsoft Office 365) or just M365 for short. M365 offers a comprehensive array of applications and services, including email, document collaboration, video conferencing, and more, all hosted on the cloud. M365 provides numerous benefits in terms of flexibility and accessibility, but it also introduces new security, performance, and compliance challenges. This is why monitoring M365 applications is critically important for organizations of all sizes.
read more
How to use IAST to prove exploitable vulnerabilities within your first-party code
Created: - 11 minutes read - 2189 words
Enabling a true “shift-left” in software security by empowering DevOps and security teams to work together
In some recent articles I shared how you as a developer can add security to your skillset by using New Relic capabilities. I also dug deeper into ways on how to mitigate hidden security risks of open source software libraries. Both of these blogs focused on third-party code and how it can impact the security of your software applications.
read more
Mitigate the hidden security risks of open source software libraries
Created: - 10 minutes read - 2027 words
Check your source code for any vulnerable libraries and start mitigating these issues
Open source software libraries have become an integral part of modern software development. They are widely used by developers to accelerate the development process and reduce costs. On average, open source libraries make up 70-90% of an entire software application. However, the use of open source libraries also comes with hidden security risks that could potentially harm your organization’s reputation and financial well-being.
read more
Level up your security skillset with New Relic
Created: - 7 minutes read - 1289 words
Not every developer is a security expert, but use these tips to improve your skills
In today’s digital age, security is a major concern for individuals and organizations alike. With the increasing number of cyber-attacks and data breaches, it’s crucial for developers to have a thorough understanding of security best practices. The security of an application is of the utmost importance, as it can directly impact the safety and privacy of users’ data.
read more