Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Datadog Detect (October 30, 2025)

Datadog Detect is a virtual mini-conference dedicated to helping security teams modernize detection and response by applying engineering best practices. Hear talks from industry experts, including security researchers and engineers at Datadog, Red Canary, and Corelight to learn about building scalable, effective security operations.

Same Adversary, New Terrain: Adapting an Endpoint Detection Mindset to the Cloud

In their talk, Katie Nickels (Sr. Director of Intelligence Operations) and Jesse Griggs (Sr. Threat Researcher) from Red Canary show you how to adapt an endpoint detection mindset to the cloud, specifically focusing on pre-impact TTPs and building robust cloud detections.

Kubernetes Tricks & Treats: Security and Scale without the Scary Stuff

Kubernetes is powerful — but let’s be honest, managing access and identities across users, clusters, kubectl sessions, RBAC rules, CI/CD pipelines, and AI agents can feel like wandering through a corn maze in the dark. Static kubeconfigs, sprawling IAM roles, and long-lived credentials are the cobwebs and skeletons cluttering your path to secure, scalable infrastructure.

Understanding CVSS 4.0 and the Future of Vulnerability Scoring

The Common Vulnerability Scoring System (CVSS) has been the industry’s go-to framework for assessing vulnerability severity for nearly two decades. It provides a standardized way to measure and communicate the technical impact of a vulnerability. As threat landscapes evolve and organizations mature in their vulnerability management practices, questions about its relevance and limitations persist. That even led to our co-founder, Scott Kuffer, writing a defense of the algorithm earlier this year.

How LLM Privacy Tech Is Transforming AI Using Cutting-Edge Tech

The promise of large language models is simple: turn messy text and data into instant answers, drafts, and decisions. The catch is simple: those models are hungry, and the most valuable data you own is also the most sensitive. If that escapes, you have legal, brand, and trust problems. This is where the story shifts. How LLM Privacy Tech Is Transforming AI is about making real deployments possible.

Why the Gartner Critical Capabilities for SIEM report belongs in every buyer's toolkit

Have you ever wished for a tool that could guide you, even on the foggiest days? That was my father’s compass. He carried it not because it told him where he was, but because it reminded him where true north was. I spent twelve years in the U.S. Navy as a cybersecurity practitioner, and that same compass has stayed with me. And in the world of SIEM and threat detection, the Gartner Critical Capabilities for Security Information and Event Management (SIEM) report feels like that compass.

Advanced Threat Hunting Demo: Brickstorm APT

Is your VMware environment secure? A sophisticated backdoor called BRICKSTORM, used by espionage actor UNC5221, could be hiding in your vCenter backups right now. Restoring from a compromised snapshot means letting the attackers right back in. But what if your backups could be your best defense? In our new 4-minute demo, we walk through the exact steps to: Proactively hunt for BRICKSTORM within your backups using YARA rules. Instantly quarantine infected snapshots to stop the threat from spreading. Identify a guaranteed 'Gold Copy' for a fast, safe, clean-room recovery.

Modern SecOps: What an AI-ready SOC actually means with Anton Chuvakin

Defender Fridays - Modern SecOps: What an AI-Ready SOC Actually Means with Dr. Anton Chuvakin Join us for this week's Defender Fridays as we explore what it actually means to build an AI-ready SOC with Dr. Anton Chuvakin, Security Advisor at the Office of the CISO for Google Cloud. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

How Tines helps organizations align with the EU Artificial Intelligence Act

The EU Artificial Intelligence Act (AI Act) introduces the world’s first comprehensive regulatory framework for artificial intelligence. It defines clear rules for how AI systems are built, deployed, and monitored, focusing on risk management, data governance, transparency, and accountability. Any organization offering AI-powered products or services to EU users (or processing EU data) must comply.

Calico Whisker in Action: Reading and Understanding Policy Traces

Kubernetes adoption is growing, and managing secure and efficient network communication is becoming increasingly complex. With this growth, organizations need to enforce network policies with greater precision and care. However, implementing these policies without disrupting operations can be challenging. That’s where Calico Whisker comes in. It helps teams implement network policies that follow the principle of least privilege, ensuring workloads communicate only as intended.