Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Normalize your data with the OCSF Common Data Model in Datadog Cloud SIEM

Security teams rely on SIEMs to aggregate and analyze data from a wide range of sources, including cloud environments, identity providers, endpoint protection platforms, network appliances, SaaS apps, and more. But every source delivers logs in its own format, with different field names, structures, and semantics. This fragmentation makes it difficult to build scalable, reusable detection rules or correlate threats across systems.

Switching to eBPF One Step at a Time with Calico DNS Inline Policy

Calico Enterprise lets users write network policies using domain names instead of IP addresses. This is done by dynamically mapping domain names to IP addresses and matching the egress traffic against these IPs. We have discussed this feature in detail when we introduced the Inline mode for the eBPF data plane in Calico Enterprise 3.20 release! It addresses the latency and performance issues of the various modes used by Calico in iptables/nftables data planes.

Are Your Web Apps Vulnerable to Infostealers Hiding in Browser Scripts?

Infostealers don’t behave like traditional malware. They work silently in the browser — the client side — harvesting saved passwords, session tokens, credit card data, and more. Attackers use common browser behaviors (JavaScript execution, third-party scripts, DOM manipulations) to: These threats often bypass traditional server-side or endpoint protection, making them invisible to most security tools unless you’re monitoring the browser itself.

Bridge the Gap: Federated Project Collaboration for AEC Teams With Egnyte

In architecture, engineering, and construction (AEC), collaboration across firms isn’t optional—it’s fundamental. Whether you’re working with architects, consultants, general contractors, or subcontractors, sharing data efficiently is critical to project success. Yet, most file-sharing methods between firms are outdated, risky, and operationally difficult.

CrowdStrike Named a Leader in the 2025 IDC MarketScape for CNAPP

We’re proud to announce that CrowdStrike has been named a Leader in the IDC MarketScape: Worldwide Cloud-Native Application Protection Platform 2025 Vendor Assessment (doc, June 2025). This recognition marks another milestone for CrowdStrike as cloud security becomes central to stopping modern cyber threats across hybrid and multi-cloud environments.

Falcon Exposure Management's AI-Powered Risk Prioritization Shows Organizations What to Fix First

As the attack surface expands and the number of vulnerabilities grows, organizations face a new crisis: how to prioritize which vulnerabilities to fix first based on their level of risk. CrowdStrike Falcon Exposure Management addresses this challenge with new AI-powered capabilities to help defenders identify what matters most and take action with precision. New innovations include AI-powered Asset Criticality, Client-Side Attack Path Analysis, and a CrowdStrike Falcon Next-Gen SIEM integration.

NGINX Integration: How to install nginx and instrument it to observe API traffic

In this step-by-step tutorial, we walk you through the complete process of installing NGINX and instrumenting it to monitor and observe API traffic. Whether you're just getting started or looking to improve your observability stack, this guide will help you set up NGINX for effective traffic monitoring. In this video you'll learn: Why is this important? Observing API traffic helps you detect issues early, optimize performance, and ensure your services are running smoothly.