Tips | Datadog

Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM

Learn the common ways attackers take advantage of Google Workspace and how to detect their activity.

Secure your container images with signature verification

Learn how to sign and verify your container images to secure them against supply chain attacks.

How attackers take advantage of Microsoft 365 services

Learn the common ways an attacker takes advantage of Microsoft 365 services and how to detect their activity.

Detect anomalies before they become incidents with Datadog AIOps

Learn how Datadog AIOps helps you proactively detect issues before they become full-blown incidents, improving ...

Kubernetes autoscaling guide: determine which solution is right for your use case

Learn about the different services that can help you scale your Kubernetes applications and how Datadog's ...

Ensure high service availability with Datadog Service Management

Learn how Datadog Service Management uses powerful data correlation alongside end-to-end incident and case ...

Identify the secrets that make your cloud environment more vulnerable to an attack

Learn how to improve secrets management by getting visibility into existing API keys, credentials, and more in ...

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

Learn how attackers take advantage of Microsoft Entra ID for lateral movement within Azure environments.

Flaky tests: their hidden costs and how to address flaky behavior

Learn how flaky tests compound testing costs and how different best practices can help you combat flakiness.

Operator vs. Helm: Finding the best fit for your Kubernetes applications

Learn about when to use a Kubernetes operator vs. a Helm chart and why Datadog migrated our production ...

Take a smarter approach to vulnerability remediation with Datadog

Learn how innovations in Datadog Software Composition Analysis and Cloud Security Management help security ...

Burn rate is a better error rate

Read here to demystify burn rates and how calculating them can be more effective than simple error rates.