Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Detect application abuse and fraud with Datadog

Protecting your applications from abuse of functionality requires understanding which application features and workflows may be misused as well as the ability to quickly identify potential threats to your services. This visibility is particularly critical in cases where an adversary finds and exploits a vulnerability—such as inadequate authentication controls—to commit fraud.

5 IT security strategies that you should think about as employees return to the office

Without a doubt, digital transformation accelerated amid the pandemic and made it possible for employees to work remotely. However, it also intensified the threat landscape created by malicious attackers who jumped on the first opportunity to attack the more vulnerable home networks. As remote working becomes the new norm, it is paramount to have an agile infrastructure and team for security. Companies need to manage and orchestrate appropriate remediation activities carefully.

Snyk uncovers malicious code activities in open source supply chain security on the npm registry

Open source helps developers build faster. But who’s making sure these open source dependencies (sometimes years out of development) stay secure? In a recent npm security research activity, Snyk uncovered a total of 8 npm packages which matched a specific malicious code vector of attack. This specific attack vector of the malicious packages included packages which had pre/post install scripts, which allowed them to run arbitrary commands when installed.

Datadog on Security and Compliance

At Datadog, customer trust and data security are of the utmost importance. As a high growth company, navigating the tradeoffs of security and development agility are especially critical. Our customers expect us to continually improve our platform, while providing a compliant, secure environment for their most critical data. Balance is key to rolling out features rapidly and keeping systems secure.

Closing the Loop on Automation, Itential and Forward Networks

Combining the power of Forward Networks' Digital Twin with Itential's low-code network automation platform enables network operations teams to take full advantage of automated network configuration without the risk of unintended consequences from change windows.

3 Realistic Ways to Drive Better Networking-Security Team Collaboration

The success of a Secure Access Service Edge (SASE) architecture depends on how well networking and security teams, and the products and services they manage, converge into a shared set of priorities tied to business objectives. Unfortunately, new research from Censuswide confirms this network-security team collaboration is still strained—if not downright combative—at a majority of enterprises.

5 Things Every MSP Should Know About Data Governance

For a managed service provider (MSP), answering questions about data governance—specifically data security and privacy—is a vital part of the job. Understanding the complexities of content management systems, automation, and more ensures you are at the top of the data security field. Maintaining file and data security is a fact of life—usually by force of law. However, it’s a subject not many of your clients will ever fully understand.