
2025 cloud security roundup: How attackers abused identities, supply chains, and AI
Read how attackers targeted cloud environments in 2025, and learn practical ways to secure them.
topic

Read how attackers targeted cloud environments in 2025, and learn practical ways to secure them.

Learn how to identify and fix Cilium network policy misconfigurations affecting Kubernetes workloads, including issues related to cross-cluster communication and namespace scoping.

Our VP of security and SRE shares how specific roles and their contributions helped develop Datadog's security organization.