
How to monitor MCP server activity for security risks
Learn how to build detection rules that identify failed permissions, excessive tool calls, and other abnormal behavior in MCP server interactions.
topic

Learn how to build detection rules that identify failed permissions, excessive tool calls, and other abnormal behavior in MCP server interactions.

Learn how combining SRE and security teams helped Datadog develop the necessary tools, processes, and principles for improved incident response.

From credential access to resource development, learn about common tactics that attackers use to target various components of AI infrastructure.