Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Easily ingest and monitor security logs with Cloud SIEM Content Packs

Datadog Cloud SIEM helps customers protect their cloud environment and SaaS applications against threats with built-in threat detection rules, interactive dashboards, workflow blueprints, and in-depth support resources. These capabilities provide valuable insights into your security posture, so you can respond promptly to emerging threats. In order to generate these insights, Cloud SIEM analyzes log data, which users can start sending to Datadog by enabling one of our out-of-the-box integrations.

Is Open Source Software Dead?

Open source software (OSS) has driven technological growth for decades due to its collaborative nature and ability to share information rapidly. However, major OSS security vulnerabilities like Log4j, Heartbleed, Shellshock and others have raised concerns about the security and sustainability of similar projects. At the same time, major open source-based companies have changed their OSS licenses, like MongoDB, Elastic (formerly ElasticSearch), Confluent, Redis Labs and most recently, HashiCorp.

Real-time Security Alerts via Microsoft Teams

Prioritizing the security of your Kubernetes environment is of utmost importance. As organizations increasingly rely on containerization for their applications, the need for robust security measures is ever-growing. But security doesn’t work in isolation; it should seamlessly blend into your workflow. This is where the integration of ARMO Platform with collaboration tools like Microsoft Teams becomes invaluable.

Do You Know These Cybersecurity Basics?

There are many ways to safeguard your information online. Some cybersecurity basics you should already have down include using strong passwords, enabling Multi-Factor Authentication (MFA), regularly updating your software, limiting location sharing, not oversharing on social media, backing up your data and utilizing a VPN. Continue reading to learn more about what it looks like to implement these cybersecurity basics.

Best in Class

Why AWS indeed. This is not one of those start with why posts, but hopefully a peek into the reasons behind our partnership with AWS and what that means for you and how it could benefit you. The beginnings of something great Public cloud is well established, with about 50% of all workloads now running in a public cloud location. We have heard of ”the big three” cloud providers: AWS, Azure, and Google Cloud.

What is ISO 31000? An Effective Risk Management Strategy

ISO 31000 was specifically developed to help organizations effectively cope with unexpected events while managing risks. Besides mitigating operational risks, ISO 31000 supports increased resilience across all risk management categories, including the most complicated group to manage effectively - digital threats. Whether you’re considering implementing ISO 31000 or you’re not very familiar with this framework, this post provides a comprehensive overview of the standard.

Easily Enable Encryption: Secure Cloud-native Development Series

Build secure cloud-native applications by avoiding the top five security pitfalls we lay out in our Secure Cloud-native Development Series. This blog is the fourth part of the series, and it will teach you why and how to easily enable encryption and save yourself headaches down the road. Here's a new motto: encrypt everything! When securely moving to cloud-native technologies, building encryption in from the start will save us a lot of headaches later.

The Top 7 Cyberattacks on U.S. Government

In a world where ones and zeros are the new battleground, these threats, cyberattacks have become a significant threat to governments worldwide. The United States, with its vast array of government agencies and critical infrastructure, is no exception. Cybersecurity threats that impact the public sector range from state-sponsored attacks to financially motivated hacking groups. In this blog post, we’ll delve into the top 7 cyberattacks on the U.S.