Tips | Datadog

Detect malicious activity in Google Workspace apps with Datadog Cloud SIEM

Learn the common ways attackers take advantage of Google Workspace and how to detect their activity.

Secure your container images with signature verification

Learn how to sign and verify your container images to secure them against supply chain attacks.

How attackers take advantage of Microsoft 365 services

Learn the common ways an attacker takes advantage of Microsoft 365 services and how to detect their activity.

Detect anomalies before they become incidents with Datadog AIOps

Learn how Datadog AIOps helps you proactively detect issues before they become full-blown incidents, improving ...

A guide on scaling out your Kubernetes pods with the Watermark Pod Autoscaler

Learn how proper provisioning and the Watermark Pod Autoscaler can help you manage Kubernetes costs.

Kubernetes autoscaling guide: determine which solution is right for your use case

Learn about the different services that can help you scale your Kubernetes applications and how Datadog's ...

Ensure high service availability with Datadog Service Management

Learn how Datadog Service Management uses powerful data correlation alongside end-to-end incident and case ...

Identify the secrets that make your cloud environment more vulnerable to an attack

Learn how to improve secrets management by getting visibility into existing API keys, credentials, and more in ...

From on-prem to cloud: Detect lateral movement in hybrid Azure environments

Learn how attackers take advantage of Microsoft Entra ID for lateral movement within Azure environments.

Flaky tests: their hidden costs and how to address flaky behavior

Learn how flaky tests compound testing costs and how different best practices can help you combat flakiness.

Operator vs. Helm: Finding the best fit for your Kubernetes applications

Learn about when to use a Kubernetes operator vs. a Helm chart and why Datadog migrated our production ...

Take a smarter approach to vulnerability remediation with Datadog

Learn how innovations in Datadog Software Composition Analysis and Cloud Security Management help security ...

Burn rate is a better error rate

Read here to demystify burn rates and how calculating them can be more effective than simple error rates.

Tips to optimize and secure Azure Functions

Check out a few tips and tricks to make sure your Azure functions are secure, efficient, and cost-effective.

How financial services companies discover, classify, and manage sensitive data with Datadog

Learn how to use Datadog to scan and obfuscate secrets, credentials, credit cards, PII, and other sensitive ...

A deep dive into investigating a complex denial-of-service attack

Learn how we used our own products to detect, investigate, and mitigate a complex attack against our load ...

How Datadog Security Inbox prioritizes security risks

Learn how Datadog Security Inbox uses a multi-tiered prioritization system to help you reduce alert fatigue ...

Detect SSRF attacks in cloud applications and APIs

Learn about the common ways SSRF attacks target cloud applications and APIs.

Monitor your CI/CD modernizations with Datadog CI Pipeline Visibility

Modernizing your CI/CD environment can mean big changes for your organization. Learn about migration benefits ...

Manage incidents seamlessly with the Datadog Slack integration

Learn how to minimize context-switching, speed up your incident response, and maintain a central source of ...

Mitigate the primary API security risks

Learn about the different types of threat actors that target APIs, their motives, and which common ...

Datadog's approach to DevSecOps: An executive perspective

Our VP of Technical Community and Open Source shares his views on the importance of integrating security ...

Enhance application security in production with Datadog Code Security

Learn how Datadog uses your application's existing instrumentation to detect vulnerabilities in production ...

Monitor your IoT devices at scale with Datadog Log Management

Datadog’s Log Management enables you to overcome the challenges of monitoring high cardinality data emitted ...

...
...