Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

Blog
Think Like a Detection Engineer, Pt. 2: Rule Writing

Blog
Monitoring GCP Audit Logs

Blog
Think Like a Detection Engineer, Pt. 1: Logging

Blog
Connect with Panther Users and Security Experts in the Panther Community

Podcast
Rapyd’s Nir Rothenberg on Lessons Learned Transitioning from On-Prem to Cloud

Blog
Monitoring 1Password Logs

Blog
A Primer on MITRE ATT&CK as an Incident Response Framework
