Blog

The Monitor

Featured Articles


Security Articles

Get practical guidance on securing cloud environments, software supply chains, and AI workloads.

Amazon EC2 security: How misconfigured and public AMIs expand your cloud attack surface

Amazon EC2 security: How misconfigured and public AMIs expand your cloud attack surface

Cloud threat detection: How to identify risky activity across control and data planes

Cloud threat detection: How to identify risky activity across control and data planes

Protect agentic AI applications with Datadog AI Guard

Protect agentic AI applications with Datadog AI Guard

Evolving security at Datadog: How we designed roles to support a growing organization

Evolving security at Datadog: How we designed roles to support a growing organization

Latest Articles







Start monitoring your metrics in minutes