Appsec | Datadog

Secure your container images with signature verification

Learn how to sign and verify your container images to secure them against supply chain attacks.

How Datadog can support your DORA compliance strategy and operational resilience

Learn how Datadog helps you stay DORA compliant by enabling you to manage risk across your entire system.

Take a smarter approach to vulnerability remediation with Datadog

Learn how innovations in Datadog Software Composition Analysis and Cloud Security Management help security ...

How Datadog Security Inbox prioritizes security risks

Learn how Datadog Security Inbox uses a multi-tiered prioritization system to help you reduce alert fatigue ...

Detect SSRF attacks in cloud applications and APIs

Learn about the common ways SSRF attacks target cloud applications and APIs.

Beyond vulnerabilities, towards a holistic approach to securing the software supply chain

Learn how to use Datadog SCA to automate reducing risks introduced by open source libraries.

Scale application security with Secure by Design principles

Learn how Datadog uses the Secure by Design approach to develop new features.

Key metrics for monitoring AWS WAF

Learn about key metrics for monitoring how well your AWS web application firewalls manage traffic and prevent ...

Tools for collecting AWS WAF data

Learn how you can collect and analyze AWS WAF metrics and logs using AWS's suite of monitoring tools.

Prioritize vulnerability remediation with Datadog SCA

See the full context of each vulnerability and its impact on your running code.

DevSecOps の現況

Datadog は、数千ものアプリケーションとクラウド環境のデータを分析し、アプリケーションセキュリティの状態と DevSecOps のベストプラクティスの採用動向を評価しました。

Mitigate the primary API security risks

Learn about the different types of threat actors that target APIs, their motives, and which common ...

Datadog Security extends compliance and threat protection capabilities for Google Cloud

Learn how Datadog provides centralized security monitoring for your Google Cloud environment.

Mitigate vulnerabilities from third-party libraries with Datadog Software Composition Analysis

Learn how Datadog SCA enables teams to secure application services.

Find vulnerabilities in your code with Datadog Code Security

Learn how Datadog helps you quickly fix critical vulnerabilities in your code with runtime monitoring, ...

Enhance SBOMs with runtime security context by using Datadog Software Composition Analysis

Learn how Datadog Software Composition Analysis can complement SBOMs with informative, queryable, and linkable ...

アプリケーション セキュリティ調査レポート

この調査レポートで、実社会でのアプリケーションセキュリティに関する7つのファクトが分かります。

Threat modeling with Datadog Application Security Management

Learn how to develop effective threat models for your system with Datadog Application Security Management.

State of Application Security

We analyzed data from thousands of organizations to discover which vulnerabilities really matter, which ...

Best practices for application security in cloud-native environments

Learn how to implement an effective strategy for keeping cloud-native applications secure.

Secure serverless applications with Datadog ASM

Learn how Datadog ASM can help secure your serverless environments.

The Confluence RCE vulnerability (CVE-2022-26134): Overview, detection, and remediation

Learn how the Confluence RCE vulnerability works, how to detect it, and how Datadog can help you secure your ...

The Spring4Shell vulnerability: Overview, detection, and remediation

Learn how the Spring4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

The Dirty Pipe vulnerability: Overview, detection, and remediation

Learn how the Dirty Pipe vulnerability works, how to detect it, and how Datadog can help you secure your ...

Best practices for securing Kubernetes applications

Learn how to improve Kubernetes security and mitigate legitimate threats to your applications.

Introducing Datadog Application Security Management

Datadog Application Security Management empowers security, operations, and development teams to build and run ...

The PwnKit vulnerability: Overview, detection, and remediation

Learn how the PwnKit vulnerability works, how to detect it, and how Datadog can help you secure your systems.

The Log4j Log4Shell vulnerability: Overview, detection, and remediation

Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your ...

Datadog acquires Sqreen to strengthen application security

Datadog has acquired Sqreen, an application security platform for the modern enterprise.

How we use Datadog for detection as code

Learn how we use our own products to implement and maintain a detection as code methodology across our ...

...
...