Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

BEC Attacks Are on the Rise for the Manufacturing Industry: What Does This Mean for You?

While ransomware continues to be a top concern for organizations, Business Email Compromise (BEC) incidents have been rising and targeting all industries. Based on the FBI’s most recent Internet Crime Report, BEC complaints outpace those of ransomware 10:1, and the losses incurred by BEC are 80 times greater than those incurred by ransomware.

Easily ingest and monitor security logs with Cloud SIEM Content Packs

Datadog Cloud SIEM helps customers protect their cloud environment and SaaS applications against threats with built-in threat detection rules, interactive dashboards, workflow blueprints, and in-depth support resources. These capabilities provide valuable insights into your security posture, so you can respond promptly to emerging threats. In order to generate these insights, Cloud SIEM analyzes log data, which users can start sending to Datadog by enabling one of our out-of-the-box integrations.

Is Open Source Software Dead?

Open source software (OSS) has driven technological growth for decades due to its collaborative nature and ability to share information rapidly. However, major OSS security vulnerabilities like Log4j, Heartbleed, Shellshock and others have raised concerns about the security and sustainability of similar projects. At the same time, major open source-based companies have changed their OSS licenses, like MongoDB, Elastic (formerly ElasticSearch), Confluent, Redis Labs and most recently, HashiCorp.

SMB Workshop Business Premium Webinar: Stripe OLT X Microsoft

In a world where IT Leaders need to manage rapid technology changes, user expectations, security concerns, BYOD policies, software licensing and budget constraints (to name a few), it’s become imperative that businesses are empowered with software that will support all of their requirements. We introduce, the Business Premium License.... This jam-packed session is centered around the value and true capabilities of the Microsoft Business Premium License, looking at how your organisation can work smarter, more efficiently and with elevated security 🔒

Real-time Security Alerts via Microsoft Teams

Prioritizing the security of your Kubernetes environment is of utmost importance. As organizations increasingly rely on containerization for their applications, the need for robust security measures is ever-growing. But security doesn’t work in isolation; it should seamlessly blend into your workflow. This is where the integration of ARMO Platform with collaboration tools like Microsoft Teams becomes invaluable.

Small Leaks, Billions Of Dollars - Cryptographic Exploits That Undermine Leading Crypto Wallets

Nikolaos Makriyannis, Cryptography Research Lead at Fireblocks, and Oren Yomtov, Blockchain Research Lead at Fireblocks, present "Small Leaks, Billions Of Dollars: Practical Cryptographic Exploits That Undermine Leading Crypto Wallets" at DEF COM 31.