
Evolving security at Datadog: How we designed roles to support a growing organization
Our VP of security and SRE shares how specific roles and their contributions helped develop Datadog's security organization.
topic

Our VP of security and SRE shares how specific roles and their contributions helped develop Datadog's security organization.

Learn how to build detection rules that identify failed permissions, excessive tool calls, and other abnormal behavior in MCP server interactions.

From credential access to resource development, learn about common tactics that attackers use to target various components of AI infrastructure.