Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Nation-State Actors Targeting Software Supply Chain via GitHub

Blog
Hey Microsoft, Security Logs Want to be Free!

Brief
Evaluating a SIEM

Webinar
How to Integrate Attack Surface Management with Real-Time Detections

Brief
Panther Solution Overview

Blog
Using AWS Secrets Manager with Panther Detections

Podcast
Google’s Anton Chuvakin and Timothy Peacock on How to Take Your D&R Efforts from 0 to 1 — or 5, or 100

Blog
The Power of Detection-as-Code, For Everyone
