April 24, 2023, midnight |

Datadog Security Labs securitylabs.datadoghq.com

If you have all the details of a thousand misdeeds at your finger ends, it is odd if you can’t unravel the thousand and first. —Sir Arthur Conan Doyle, "A Study in Scarlet"


As detection engineers or security analysts, we like to think of ourselves as detectives, peering into every log to determine if an activity is bad or not—hence starting this blog post with a Sherlock Holmes reference. Just as Holmes aims to understand what a criminal might do …

analysts arthur bad blog blog post cloud criminal detection engineers finger google google cloud holmes log peering reference security study threat threat detection understand

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)