Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog

Collect Google Cloud Armor logs with Datadog

As the internet continues to evolve, cybersecurity threats—particularly Distributed Denial of Service (DDoS) attacks—are an increasingly significant concern for organizations. In this post, we’ll look at how you can use Datadog to collect Google Cloud Armor (GCA) logs and detect and respond to potential DDoS attacks in real-time. But first, we’ll briefly cover what DDoS attacks are and how they work.

This Month in Datadog: Heatmaps Updates, API Catalog, Content Packs for Cloud SIEM, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we put the Spotlight on a pair of Heatmaps updates..

Indigov's security team uses Datadog Cloud SIEM & Log Management to reduce mean time to respond

Watch this video to learn about how Indigov’s Security team (that runs their SOC, compliance program, and operations to support developers throughout the software development lifecycle) has deemed Cloud SIEM as one of the easiest and most integrated platforms to drive down response time from hours to minutes. Datadog Log Management has helped Indigov centralize all disparate data into one spot and Datadog Cloud SIEM’s out of the box detection rules and workflows have helped to capture their incident response process–driving response time down from hours to minutes!

Security-focused chaos engineering experiments for the cloud

Modern cloud applications are made up of thousands of distributed services and resources that support an equally large volume of concurrent requests. This level of scale makes it more challenging for engineers to identify system failures before they lead to costly outages. System failures are often difficult to predict in cloud environments, and security threats add another layer of complexity.

Best practices for creating custom detection rules with Datadog Cloud SIEM

In Part 1 of this series, we talked about some challenges with building sufficient coverage for detecting security threats. We also discussed how telemetry sources like logs are invaluable for detecting potential threats to your environment because they provide crucial details about who is accessing service resources, why they are accessing them, and whether any changes have been made.