Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Optimize CloudTrail Ingestion with Modern SIEM

Blog
5 Things You Need to Know About the State of SIEM in 2022

Blog
State of SIEM 2022: 5 Key Takeaways

Blog
Get Started: AWS and Panther

Webinar
ActBlue Builds a Scalable Data Pipeline to Empower Their Security Engineers with Panther

Podcast
Adeel Saeed on How to Move from A Reactive to a Proactive Threat Detection & Response Model

Case Study
Intercom Builds High-Value Detections That Minimize Alert Fatigue

Blog
Protect Azure Services with Microsoft Graph API
