Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
How Detection-as-Code Revolutionizes Security Posture

Blog
Panther Announces Splunk Alert Destination Integration

Blog
Introducing Panther’s Security Data Lake Search

Webinar
Detecting & Investigating Cloud Crypto Mining

Brief
Security Data Lake Search, No SQL Required

Brief
Unlock Detection Engineering in Splunk with Panther

Blog
From Logs to Detection: Using Snowflake and Panther to Detect K8s Threats

Podcast
Google Cloud’s Anton Chuvakin on Decoupled SIEMs and the Future of Data Platforms and Security
