Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Improve detection fidelity and alert triage with Lookup Tables in Panther

Blog
XDR vs SIEM: A Technical Comparison

Podcast
r2c’s Clint Gibler: How To Succeed in AppSec at Scale

Podcast
Aston Martin’s Robin Smith: Advocating For Lean Security Programs

Blog
What is security analytics? An overview on the toolsets & business use cases

Podcast
Snowflake’s Haider Dost and Daniel Wyleczuk-Stern: What You Need To Start Building a Scalable Detection Program

Webinar
How to Implement Snowflake Security Best Practices with Panther

Blog
AWS CloudTrail Logs: A Security Monitoring Overview
