Resource Hub
Featured Resources
Detection-as-Code
All Resources
Podcast
Netflix’s Dan Cao and Brex’s Josh Liburdi on Balancing Big Platforms and Bespoke Tools

Blog
How to Know You’re Ready for a Dedicated Detections Team

Podcast
ThoughtSpot’s Alessio Faiella on Building Forward-Looking Security Programs

Blog
Introducing pypanther: The Future of Code-Driven Detection and Response

Blog
Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024

Podcast
Sprinklr’s Roger Allen on Preventing Team Burnout in Cybersecurity

Blog
Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools

Podcast
WP Engine’s Christopher Watkins on Cost-Effective Threat Hunting Strategies
