Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing Datadog's cloud infrastructure: Our playbook and methodology

At Datadog, we build and operate a complex, self-managed infrastructure that spans multiple cloud providers and serves many customers in regulated environments. We need to secure this large, distributed infrastructure while maintaining strict uptime requirements and scaling our finite people resources. In this post, I’ll detail the playbook that we use on Datadog’s Cloud Security team for securing our infrastructure, including.

Dynamic IPs Are Breaking Security - Here's How to Fix It

Organizations rely on stable systems to run their operations. Unfortunately, the IP addresses representing these systems can change frequently. This is especially challenging for cybersecurity, where identifying and tracking assets by IP address is crucial. Dynamic IP management is the practice of identifying, tracking, and contextualizing systems that use dynamic IPs to ensure accurate visibility, reduce noise, and maintain a continuous security posture.

How Claude + MCP + Vanta could help auditors

At Vanta, we’re always looking to experiment, learn, and stay at the forefront of AI. Recently, we built a proof of concept to explore how auditors could interact more effectively with audits and the data within them. Our experiment used Anthropic’s Claude, the open source MCP (Model Context Protocol), and Vanta’s API to enable users to ask deeper questions of Vanta’s compliance data. ‍ ‍

The Rise of Perfect Clones: The Darcula Phishkit and How to Stop It

It’s no secret that phishing has always relied on deception. Scam-targeted enterprises the world over warn their customers of the social engineering tactics and brand impersonation designed to trick them into handing over credentials. Besides email-based phishing, social media has become a hotbed for phishing attacks, with scammers using fake ads, impersonated accounts, and fraudulent messages to lure users.

Healthcare Sector Targeted by Fake CAPTCHA Attack on HEP2go to Deliver Infostealer Malware

Arctic Wolf has recently observed a campaign targeting the healthcare sector, where victims visiting the widely used physical therapy video site HEP2go are redirected to a fake CAPTCHA webpage when they attempt to visit multiple parts of the website. This CAPTCHA provides instructions that trigger PowerShell code execution and the eventual loading of infostealer malware.

Webinar: Secure Your Remote Workforce with a Secure Access Service Strategy

In today’s rapidly evolving digital landscape, traditional security models fail to protect remote workers and cloud-based applications. Shifting to a secure access service edge (SSE) strategy is an effective and affordable solution that will protect remote workers. SSE solutions deliver firewall-as-a-service (FWaaS) and secure web gateway (SWG) capabilities, ensuring safe, high-performance connectivity to Cloud applications.

Introducing Outpost24 CyberFlex

Today, Outpost24 is excited to announce the launch of its new CyberFlex solution, a flexible combination of ASM and PTaaS. With two-thirds of organizations having experienced a cyberattack via unmanaged internet-facing assets, the CyberFlex solution provides an unmatched approach to the comprehensive discovery, risk management, and protection of all your external-facing applications.

Intelligence-Led Threat Hunting: The Key to Fighting Cross-Domain Attacks

Cross-domain attacks have become a defining challenge in modern cybersecurity, with adversaries exploiting gaps across endpoints, identity systems, and cloud environments to achieve their objectives. These sophisticated attacks use stealthy, malware-free techniques and legitimate tools, making them exceptionally difficult to detect and disrupt.

Banish bots from your Waiting Room and improve wait times for real users

With Cloudflare Waiting Room, you can safeguard your site from traffic surges by placing visitors in a customizable, virtual queue. Previously, many site visitors waited in the queue alongside bots, only to find themselves competing for inventory once in the application. This competition is inherently unfair, as bots are much faster and more efficient than humans. As a result, humans inevitably lose out in these high-demand situations, unable to secure inventory before bots sweep it all up.

EMS SSO: How to Improve Security with Single Sign-On Solutions

In the digitally savvy world of today, controlling user access across several workplace apps can be difficult. With EMS SSO (Enterprise Management System Single Sign-On), users may log in only once and access numerous platforms securely without having to remember multiple login passwords. This streamlines authentication. Convenience is increased, and security is greatly strengthened by lowering password-related risks.