Threat Detection | Datadog

Fix common cloud security risks with the Datadog Security Labs Ruleset

Learn how the Datadog Security Labs Ruleset for CSM helps DevOps and security teams manage high priority ...

Visualize activity in your cloud environment with Datadog Cloud SIEM Investigator

Learn how Datadog Cloud SIEM provides shared context for security teams and DevOps to monitor activity in ...

Best practices for endpoint security in cloud-native environments

Learn best practices for securing all the resources and devices connected to either an organization's network ...

Best practices for network perimeter security in cloud-native environments

Learn best practices for securing the boundaries of your cloud network.

Collect GitHub audit logs and scanning alerts with Datadog

Learn how you can use Datadog to analyze your organization's GitHub activity and get alerted to code-level ...

Catch attacks at the network layer with DNS-based threat detection

Learn how Datadog's DNS-based threat detection rules can help you secure your applications and infrastructure.

The Confluence RCE vulnerability (CVE-2022-26134): Overview, detection, and remediation

Learn how the Confluence RCE vulnerability works, how to detect it, and how Datadog can help you secure your ...

Detect cryptocurrency mining in your environment with Datadog Cloud SIEM

Learn how Datadog can help you identify when an attacker is using your system resources to mine ...

The Spring4Shell vulnerability: Overview, detection, and remediation

Learn how the Spring4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

The Dirty Pipe vulnerability: Overview, detection, and remediation

Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your ...

Detect suspicious login activity with impossible travel detection rules

Learn how Datadog Cloud SIEM's impossible travel detection rule type can help improve your organization's ...

Best practices for securing Kubernetes applications

Learn how to improve Kubernetes security and mitigate legitimate threats to your applications.

Introducing Datadog Application Security Management

Datadog Application Security Management empowers security, operations, and development teams to build and run ...

The PwnKit vulnerability: Overview, detection, and remediation

Learn how the PwnKit vulnerability works, how to detect it, and how Datadog can help you secure your systems.

Elevate AWS threat detection with Stratus Red Team

Learn how you can emulate common attack techniques directly in your cloud environment with our new open source ...

Best practices for creating detection rules with Datadog Cloud SIEM

Learn how to create detection rules that enable you to efficiently identify and respond to security threats in ...

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

Secure HashiCorp Vault with Datadog Cloud SIEM

Learn about HashiCorp Vault security threats and how to detect them with Datadog.

Monitor your Netlify sites with Datadog

Learn how to use Datadog to collect function and traffic logs to monitor your Netlify-powered applications.

How to detect security threats in Linux processes

Learn how to spot signs of security threats in Linux processes.

Automate remediation of threats detected by Datadog Cloud SIEM

Learn how to use webhooks to automate security operations based on your Datadog monitoring data.

Detect application abuse and fraud with Datadog Cloud SIEM

Learn how Datadog helps you detect abuse of functionality tactics and techniques that are mapped to the MITRE ...

Detect unauthorized third parties in your AWS account

Learn how to use Datadog Cloud SIEM's new term detection method to secure your AWS environment against ...

Detect anomalous activity in your environment with new term–based Detection Rules

Learn how to use Datadog Cloud SIEM's new term detection method to monitor baseline activity across your ...

Key Kubernetes audit logs for monitoring cluster security

Learn some of the key Kubernetes API server audit logs that can help you detect potential threats to your ...

Collect and monitor Microsoft 365 audit logs with Datadog

Learn how our integration gives you a deeper level of insight into the security and performance of your Microsoft 365 services.

Accelerate security investigations with Datadog Threat Intelligence

Learn how to use Datadog's turn-key threat intelligence to surface potential threats and triage security ...

Datadog monitors Amazon Route 53

Get insights into your Amazon network’s Route 53 DNS traffic with Datadog.

Monitor Auth0 with Datadog

Enable Datadog's Auth0 integration to monitor logs for potential security threats.

Monitor Carbon Black Defense logs with Datadog

Learn how Datadog can help you monitor your Carbon Black Defense logs and get full visibility into endpoint ...

Monitor AWS IAM Access Analyzer findings with Datadog

Deliver AWS IAM Access Analyzer findings to your Datadog account to ensure your AWS resources are secure.

Monitor Twistlock with Datadog

Datadog's new integration with Twistlock allows you to monitor security and compliance alongside your ...