Blog

The Monitor

Featured Articles


Security Articles

Get practical guidance on securing cloud environments, software supply chains, and AI workloads.

Evolving security at Datadog: How we designed roles to support a growing organization

Evolving security at Datadog: How we designed roles to support a growing organization

How to monitor MCP server activity for security risks

How to monitor MCP server activity for security risks

Security and SRE: How we implemented our combined approach

Security and SRE: How we implemented our combined approach

Abusing AI infrastructure: How mismanaged credentials and resources expose LLM applications

Abusing AI infrastructure: How mismanaged credentials and resources expose LLM applications

Latest Articles

Highlights from AWS re:Invent 2025: Making sense of applied AI, trust, and going faster

Highlights from AWS re:Invent 2025: Making sense of applied AI, trust, and going faster







Start monitoring your metrics in minutes