Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Container Security Fundamentals - Linux namespaces part 1: The mount namespace

One of the technologies used by Linux containers to provide an isolated environment, is namespaces. They are used to provide a contained process with an isolated view of different Linux resources. In this video we look at some of the details of how Linux namespaces work and then take a more detailed look at the mount namespace which isolates a processes' view of its filesystem.

Resource Catalog

Resource Catalog provides visibility and security context directly to DevOps in the same platform they are already using every day to monitor their infrastructure. As a result, DevOps teams no longer have to react to a laundry list of security threats. Instead, they are armed with the insight to vigilantly detect security misconfigurations and reduce the mean time to remediation so that their security posture is strengthened.

Leveraging Security Asset Inventories

Asset inventories enable you to know what you have to secure, and to monitor it for deviations. The pace of iteration in the world of software engineering makes those platforms inevitable. In this episode we welcome Sacha Faust, director of security engineering at Grammarly, who built Cartography, one of the first open source asset inventory. Sacha describes what led them to building this (funnily: an offensive use case!), how inventories enable spreading ownership to software teams, the solution that exist off the shelf today, …

Application Vulnerability Management demo

Application Vulnerability Management provides continuous, real-time vulnerability detection across applications in production. See how you can use Application Vulnerability Management to identify, prioritize, and resolve high-impact vulnerabilities exposed in production, without any performance overhead.

Risk Management is a Team Sport with Emilio Escobar

Datadog's Chief Information Security Officer, Emilio Escobar, discusses how organizations are reducing silos between devops and security teams in order to effectively manage security risks. In order to provide secure defaults, decentralized security, and rapid response to security events with deep context, Datadog embeds security at all different levels and scales its program by utilizing security ambassadors and engineers.

Datadog's Security Observability Day 2023

Datadog Cloud Security products offers real-time security monitoring across the stack, leveraging the Datadog Observability platform already used by millions of engineering teams. During this Datadog Security Observability Day we’ve shared how Datadog is making security a team sport, and how our security products help observe, uncover and secure vulnerabilities that matter.