このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
The Datadog Security Research Feed provides continuously updated security-related content to help organizations stay ahead of emerging threats and vulnerabilities. Managed by Datadog’s Security Research and Detection Engineering teams, the feed delivers timely insights into critical security developments, including:
- Emerging vulnerabilities and threats: Updates on newly discovered vulnerabilities and active attack campaigns that could impact your infrastructure. These updates help security teams assess detection coverage, identify affected systems, and determine potential impact.
- New detection content: The latest detections released by Datadog’s Detection Engineering team, including new tactics, techniques, and procedures (TTPs), and supported detection packs.
- Product updates: Enhancements to Datadog’s security capabilities that improve your ability to monitor and protect your environment.
How it works
The Security Research and Detection Engineering teams continuously monitor the threat landscape and publish updates as soon as new threats emerge. This ensures security professionals have access to:
- Expert analysis on the latest security trends.
- Contextual information to assess the impact of a vulnerability or threat.
- Guidance on implementing effective detection and response strategies.
Criteria for emerging vulnerabilities
An emerging vulnerability is a security weakness in a technology that significantly threatens business operations and is defined by one or more of the following criteria:
- Widespread impact: The vulnerability affects a large number of systems or organizations, creating a broad attack surface.
- High severity: Its exploitability and potential damage make it an immediate security concern.
- Significant visibility: The issue is widely discussed in security communities and mainstream news, increasing awareness and urgency.
Criteria for emerging threats
An emerging threat is a new or evolving attack campaign or supply-chain attack that has disrupted or poses a significant threat to business operations. It is defined by one or more of the following criteria:
- Widespread impact: The threat has already affected a large number of systems or organizations, either through broad, opportunistic attacks, or targeted campaigns.
- Imminent threat: The threat has already caused impact or is expected to escalate, with near-term attacks likely to affect many organizations.
- Significant visibility: The issue is widely discussed in security communities and mainstream news, increasing awareness and urgency.