Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Monitor Falco with Datadog

Organizations running containerized environments face complex security challenges as they scale Kubernetes and adopt dynamic, ephemeral infrastructure. Traditional security tools often miss activity inside containers, making it difficult to detect policy violations or threats at runtime. Falco is a runtime security monitoring tool for containerized infrastructure.

Same Adversary, New Terrain: Adapting an Endpoint Detection Mindset to the Cloud

In their talk, Katie Nickels (Sr. Director of Intelligence Operations) and Jesse Griggs (Sr. Threat Researcher) from Red Canary show you how to adapt an endpoint detection mindset to the cloud, specifically focusing on pre-impact TTPs and building robust cloud detections.

Datadog Detect (October 30, 2025)

Datadog Detect is a virtual mini-conference dedicated to helping security teams modernize detection and response by applying engineering best practices. Hear talks from industry experts, including security researchers and engineers at Datadog, Red Canary, and Corelight to learn about building scalable, effective security operations.

The Goldilocks Approach: Finding Detections That Are Just Right

In this talk, Megan Roddie-Fonseca, Sr. Security Engineer at Datadog, addresses the challenge of finding "just right" detections, leveraging data classification techniques like recall and precision to balance false positives and missed attacks. Presented on October 30, 2025 for Datadog Detect.

Silence of the Daemons: Why Evasion Isn't About Location and NDR's Role in the Cloud

In this talk, David Burkett, Cloud Security Researcher at Corelight, highlights how timeless evasion tactics create critical blind spots in cloud workloads, and illustrates the role of Network Detection and Response (NDR) as a resilient countermeasure. Presented on October 30, 2025 for Datadog Detect.

Using LLMs to filter out false positives from static code analysis

Static application security testing (SAST) is foundational to modern application and code security programs. Yet these tools inevitably produce false positives that require manual review. When scanners find vulnerabilities that are not genuine issues, they erode trust, slow down remediation, and make it harder for teams to understand which alerts require attention.

LLM guardrails: Best practices for deploying LLM apps securely

Prompt guardrails are a common first line of defense against client-level LLM application attacks, such as prompt injection and context poisoning. They’re also a critical component of a full defense-in-depth strategy for LLM security at the infrastructure, supply chain, and application level. The specific guardrails that teams implement depend highly on use case, but they are typically designed to.

Automate Security Response with Datadog Workflow Automation

Responding to threats often requires time-consuming, multi-step actions across multiple tools, slowing down investigations and increasing risk. Learn how security teams can automate a wide range of workflows, from everyday tasks to complex, multi-step investigations, so they can streamline response and reduce manual effort across tools and environments. In this demo, see how Datadog’s integrated SOAR, powered by Workflow Automation, helps you build, test, and manage automated security playbooks with confidence.

Monitor OCI Audit Logs with Datadog Cloud SIEM

Oracle Cloud Infrastructure (OCI) provides compute, storage, networking, and database services for running enterprise applications and workloads in Oracle. OCI supports both traditional and cloud-native applications, offering scalable, secure, and high-performance infrastructure for hybrid and multi-cloud environments. Securing workloads in OCI can be complex for organizations managing a mix of on-prem, hybrid, and cloud environments.

Datadog achieves IRAP's PROTECTED status in Australia

As Australian government agencies and regulated industries move sensitive workloads to the cloud, they need observability solutions that meet highly stringent data protection standards. To address this need, Datadog has pursued and received an Infosec Registered Assessors Program (IRAP) assessment at the PROTECTED level. This is an advanced classification under the Australian Cyber Security Centre (ACSC) framework for cloud and SaaS security.