Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM

Many organizations face significant challenges with onboarding teams to a new or existing SIEM. Security teams grapple with escalating expenses tied to data ingestion, storage, and retention at scale. Steep learning curves can make setup an ongoing and frustrating chore, leading to mistakes and gaps in coverage. Further, SIEMs with constrained ecosystem integrations block users from the tools and customizable workflows they need and are comfortable with.

What is a Cloud-Native Security Automation Framework? Benefits & Use Cases

We live in a world where infrastructures reside entirely in the cloud, threats evolve faster than ever, and attackers never sleep. Manual security processes simply can’t keep pace. Cloud-native security automation is the critical solution for organizations to secure large attack surfaces.

17 Security Tips For Hybrid Workers

The days of full remote work may be behind for most of us, but the hybrid work model is stronger than ever. In 2024, approximately 27% of workers in Europe are estimated to be working in a hybrid model, and around 36% in the US are working in a structured hybrid model. Hybrid work models also offer flexibility in their structure, with the different kinds of models companies use being: While hybrid work offers many benefits, what are the risks for hybrid workers in terms of security?

OT Security in Ports: Lessons from the Coast Guard's Latest Warning

The cranes that move goods in and out of America's busiest ports (some of the most essential components of our national logistics chain) are under growing scrutiny. In a newly issued MARSEC Directive 105-5, the U.S. Coast Guard has raised red flags about the cybersecurity risks that come with ship-to-shore (STS) cranes manufactured in China. These cranes, mostly produced by state-owned enterprises like Shanghai Zhenhua Heavy Industries (ZPMC), make up nearly 80% of the STS equipment at U.S. ports.

CVE-2025-20309: Cisco Unified Communications Manager Static SSH Credentials Maximum Severity Vulnerability

On July 2, 2025, Cisco released a security advisory detailing a maximum severity vulnerability (CVE-2025-20309) in Cisco Unified Communications Manager and Unified Communications Manager SME Engineering Special, caused by hard-coded root SSH credentials that cannot be changed or removed.

To Report or Not to Report Ransom Payments - A Helpful and Useful Idea

Just a recap - Trustwave in no way endorses ransom payments. We believe the best way to deal with a ransomware situation is to: A: Create a strong defensive posture that will deter, if not stop, an attack. B: Have in place a solid and well-practiced incident response plan that includes backups so an organization can quickly recover from any attack.

To Report or Not to Report Ransom Payments - Possibly Not Worth the Effort

Just a recap - Trustwave in no way endorses ransom payments. We believe the best way to deal with a ransomware situation is to: A: Create a strong defensive posture that will deter, if not stop, an attack. B: Have in place a solid and well-practiced incident response plan that includes backups so an organization can quickly recover from any attack.

SOC analyst vs. security analyst: What's the difference?

A security operations center (SOC) analyst enhances your security posture by defending the organization against cybersecurity threats. Responsible for monitoring, detecting, investigating, and responding to cyber threats, the SOC analyst is the first line of defense in keeping the organization’s IT ecosystem secure when an incident arises. A security analyst, similar to a SOC analyst, is responsible for proactive defense and security posture.

Unlock the Retail Edge: How Partners Can Lead with Cato

To compete in today’s retail landscape, IT must support new growth strategies while delivering seamless, secure customer experiences. This means enabling rapid store rollouts, digitizing in-store experiences, and connecting cloud-based systems across every location. Customers expect faster, more connected, and more secure interactions at every touchpoint.