Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to track down your expired domain names before hackers do

What happens when your organization’s domain name expires or changes? Expired domains don’t simply disappear, and they can even become attack routes into your organization. Recent news out of Belgium has highlighted the potential danger, with hundreds of expired domain names and email addresses of government services being found available for purchase online.

Key learnings from the State of DevSecOps study

We recently released the State of DevSecOps study, in which we analyzed tens of thousands of applications and cloud environments to assess adoption of best practices that are at the core of DevSecOps today. In particular, we found that: In this post, we provide key recommendations based on these findings, and we explain how you can leverage Datadog Application Security Management (ASM) and Cloud Security Management (CSM) to improve your security posture.

Data Backup Best Practices and Strategies for MSPs

Managing data effectively has never been more of an imperative for Managed Service Providers (MSPs). The one-two punch of increasing cybersecurity threats and regulatory pressures make this particularly pertinent, and with the proliferation of hybrid and remote work models, the importance of reliable data backup solutions is expanding exponentially. With all that taken into account, here are some effective strategies that will deliver continuity and resilience, while in turn maintaining client trust.

JumpCloud and Google: Even Better Together

It’s been just over a year since JumpCloud and Google announced a strategic partnership to seamlessly manage your Google Workspace identities, the access they need, from any device leveraging one platform. You may be wondering what’s new, how it’s going for our customers and partners, and what benefits they’re getting from the joint solution? This article provides a condensed set of resources that make it simpler to get started with a demo or simulations.

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.

10 modern Node.js runtime features to start using in 2024

The server-side JavaScript runtime scene has been packed with innovations, such as Bun making strides with compatible Node.js APIs and the Node.js runtime featuring a rich standard library and runtime capabilities. As we enter into 2024, this article is a good opportunity to stay abreast of the latest features and functionalities offered by the Node.js runtime.

5 Things Holding Back Your Vulnerability Management Program and How to Overcome Them Step by Step

Welcome to our latest vulnerability management webinar, hosted by Scott Kuffer and Gene Bandy. In this session, Scott and Gene dive deep into the complexities and challenges faced by organizations in managing vulnerabilities and what you can do about it. Key Topics Covered: Why Watch This Webinar? Don't forget to like, comment, and subscribe for more in-depth webinars and expert discussions on cybersecurity and vulnerability management!

Advanced Threat Protection for Apps Built Using AI

AI has undoubtedly revolutionized various industries, enhancing both efficiency and innovation through low-code and no-code platforms. Yet, this ease of development brings with it an increased burden of security. As business users and developers rapidly build applications, automations, and bots using AI, the complexity and volume of these creations amplify potential security vulnerabilities.