This Month in Datadog - April 2026

In the latest episode of This Month in Datadog, Jeremy shares how to run autonomous Cloud SIEM investigations, remediate vulnerabilities with auto-generated fixes, and use natural language to explore Datadog. Later, Sumedha Mehta spotlights the Datadog MCP Server, which gives AI agents real-time access to Datadog’s observability data. Then, Chetan Sharma walks through Datadog Experiments, which measures how product changes impact the user journey.

You Wouldn't Download a Shipment - The 443 Podcast - Episode 369

This week on the podcast, we discuss a recent warning from the FBI about hacking leading to stolen shipments. Before that, we cover the Vercel software supply chain incident before discussing the Vect Ransomware-as-a-service turned accidental wiper.

"Copy Fail" Vulnerability (CVE-2026-31431): Linux Kernel Privilege Escalation

CVE-2026-31431— the “Copy Fail” vulnerability—is a critical local privilege escalation (LPE) flaw in the Linux kernel’s cryptographic subsystem that allows unprivileged users to gain root access with near-perfect reliability. Boasting a CVSS score of 7.8 and affecting nearly every mainstream distribution since 2017 (including Ubuntu, RHEL, and Amazon Linux), Copy Fail has been added to the CISA KEV catalog due to its active exploitation and portable, low-footprint nature.

Detection, endpoint isolation, and ticketing with one AI prompt

Most current demonstrations of AI in security operations are lackluster. You ask a chat interface a question, get a summary, and maybe a suggested next step. The operator still does all the work, at human speed. Meanwhile, adversaries are already deploying AI offensively against their targets. AI in SecOps must ultimately be an operator. Otherwise, the gap between adversary and defender will become too wide to bridge. LimaCharlie Co-founder, Christopher Luft, demonstrates a simple way to get started.

Maximizing Cybersecurity with SOC Support Consulting: What You Need to Know

As cyber threats continue to grow and become more threatening, it’s important for businesses to implement robust cybersecurity measures. SOC Support Consulting is becoming increasingly important for improving cybersecurity because it equips companies with the knowledge and tools to quickly identify and stop threats. According to Vectra AI, businesses leveraging SOCaaS are likely to detect threats 96% faster compared to those with an in-house SOC.

Vanta Third Party Risk Management Demo Part 1: Discovery & Program Setup

Vanta TPRM brings structure to vendor discovery and onboarding, turning scattered processes into a centralized, scalable system of record. In this demo, see how teams setup their third party risk program with Vanta. We'll show you how to define risk criteria, and stand up a tailored TPRM program. From initial discovery through procurement intake, Vanta helps you get organized and operational without the manual overhead.

Vanta Third Party Risk Management Demo Part 2: Agentic Assessment

Vanta TPRM transforms vendor assessments into an automated, intelligent workflow, helping your team move faster without sacrificing depth. In this demo, see how Vanta's AI-powered assessment gathers evidence, answers questions, and surfaces key findings—so you can evaluate vendor risk with greater speed, consistency, and confidence.

How to Deploy DSPM Across Multiple Cloud Environments

Most enterprises are not running on a single cloud. The vast majority of organizations now operate in hybrid or multi-cloud environments and sensitive data follows wherever workloads go. Regulated files end up in S3 buckets. PII lands in BigQuery development tables. Source code copies into Azure Data Lake repositories that no policy anticipated. The problem is not that organizations chose to spread data across clouds. The problem is that most security programs were not built to track it.

Vanta Third Party Risk Management Demo Part 3: Continuous Monitoring

Vanta TPRM keeps you ahead of vendor risk with continuous monitoring and real-time visibility into your third-party ecosystem. In this demo, see how teams track changes, respond to alerts, and maintain an up-to-date understanding of vendor risk—without relying on periodic reviews or manual follow-up.