Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2024

Identify the secrets that make your cloud environment more vulnerable to an attack

Compromised secrets, such as leaked API and SSH keys, credentials, and session tokens, are the leading cause of cloud security incidents. While attackers can directly compromise secrets through methods like phishing, they can also gain control by finding and taking advantage of simple misconfigurations in your environment.

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

There are several tactics that threat actors can use to access cloud environments, services, and data. A common example is lateral movement, which involves techniques that enable a threat actor to pivot from one host to the next within an environment. This type of activity often uses other tactics, such as initial access and privilege escalation, as part of a larger attack flow.

Monitor your Windows event logs with Datadog Cloud SIEM

Windows event logs are a key source of important information about your Windows environments, including detailed records of user activities, system performance, and potential security issues. However, with the sheer volume of logs modern environments generate, it can be overwhelming for security teams to efficiently detect, triage, and respond to threats in real time.

Key learnings from the 2024 State of Cloud Security study

We’ve just released the 2024 State of Cloud Security study, where we analyzed the security posture of thousands of organizations using AWS, Azure, and Google Cloud. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can use Datadog Cloud Security Management (CSM) to improve your security posture.

How Datadog can support your DORA compliance strategy and operational resilience

Reliable access to financial data is critical for organizations and individual consumers alike, making resiliency key for financial institutions responsible for managing this information. While cloud computing can strengthen your app’s resiliency, it can also open up new security risks and require more complex continuity planning.

How we use Datadog for detection as code

Detection as code (DaC) is a methodology that treats threat detection logic and security operations processes as code. It involves applying software engineering best practices to implement and manage detection rules and response runbooks. This approach addresses many of the pain points associated with traditional security operations.

How companies subject to HIPAA requirements manage sensitive data with Datadog

Healthcare organizations face unique challenges in managing and processing vast amounts of personal information, such as medical records, insurance information, Social Security numbers, and more. To accelerate patient care, these organizations are under pressure to rapidly share this information among providers, insurers, and patients—all within the landscape of a rapidly evolving cloud environment.

Monitor your SentinelOne logs and alerts with Datadog Cloud SIEM

Endpoints, whether physical devices or cloud resources, are critical targets for potential cyberattacks. SentinelOne is an endpoint detection and response (EDR) solution that provides real-time detection of and response to endpoint threats. Using both static and behavioral detections, SentinelOne Singularity Endpoint helps protect against a range of threats, including malware, zero-day exploits, advanced persistent threats, and more.