Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How we use Datadog CSM to improve security posture in our cloud infrastructure

In complex cloud environments where the speed of development is accelerated, managing infrastructure and resource configurations can be an overwhelming task—particularly when certifications and compliance frameworks like PCI, HIPAA, and SOC 2 present a lengthy list of requirements. DevOps and engineering teams need to ship code updates at a rapid pace, making it easy for them to accidentally overlook misconfigurations.

Improve Content Accessibility and Control Sprawl with Egnyte's File and Folder Shortcuts

Given the growth of hybrid work models, organizations are becoming increasingly decentralized. Employees operating from diverse locations access business information through various cloud tools and digital devices.

Visualizing Trust Assurance: The Story Behind Our New Look

Customers come to us for many reasons: to spend less time preparing for audits and answering security questionnaires, to prove their impact to their boss and board, to log into fewer systems, to save money, to strengthen their security posture, to make it easier for their colleagues to support compliance efforts – to name a few.

Best practices for building a production-ready Dockerfile for PHP applications

Docker is a containerization platform for bundling your code, dependencies, and runtime environment into self-contained units that run identically in different environments. Dockerizing a PHP application simplifies deployment by packaging the PHP runtime, a web server, and your source code and composer dependencies into a container. Getting started with Docker is easy. However, there are a few pitfalls you need to avoid before you can safely use it in production.

Keeper 101 - Advanced Reporting & Alerts Module (ARAM)

The Advanced Reporting and Alerts Module (ARAM) tracks over 200 security events across the organization and addresses many password-related cybersecurity auditing, alerting and compliance needs. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.

How To Secure Your Social Media Accounts

Keeping your social media accounts safe is crucial to keeping your sensitive data protected. In this blog, you’ll learn how to strengthen your accounts by using strong and unique passwords, setting up MFA, adjusting your privacy settings and keeping an eye on your account activity. Continue reading to learn more ways you can secure your social media accounts and the common threats social media accounts face.

CrowdStrike's Solution to Help School Districts Meet Cybersecurity Challenges

IT administrators and security teams are back to school and busy preparing for new students and new challenges. Technology is now an integral part of K-12 education — since the pandemic, ChromeOS devices like Chromebooks have revolutionized the learning experience, enabling students and educators to access a wealth of resources and collaborate seamlessly from almost anywhere, evolving the way students learn and teachers teach.