Request a demo

Request a demo

Blog

Blog

Blog

Blog

Case Studies

Webinars

Blogs

E-books

Podcasts

Briefs

pen

Blog

Panther + Wiz: Empowering SecOps Teams with Unified Context

pen

Blog

Sigma Rules: Your Guide to Threat Detection’s Open Standard

pen

Blog

Investigating Amazon EKS Privilege Escalation with PantherFlow

pen

Blog

Introducing PantherFlow: Accelerate Investigations in Your Security Data Lake

pen

Blog

How to Write Queries in PantherFlow, a Piped Search Language

pen

Blog

Panther Debuts as Wiz Defend Launch Partner

pen

Blog

Why PantherFlow: How Our Piped Query Language Simplifies Search

pen

Blog

How to Know You're Ready for a Dedicated Detections Team

pen

Blog

Python for Cybersecurity: Key Use Cases and Tools

pen

Blog

Introducing pypanther: The Future of Code-Driven Detection and Response

pen

Blog

Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024

pen

Blog

Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools

pen

Blog

5 Reasons Your Pipeline Is Broken–And How to Fix It

pen

Blog

Enhanced Identity Attack Detection with Push Security

pen

Blog

How to Turn Security Pipelines Into Gold Mines

pen

Blog

Regarding the Recent Campaign Targeting Snowflake Customers

pen

Blog

Make Your SecOps Pipe Dreams a Reality

pen

Blog

Why You Should Be Ingesting AWS VPC Flow Logs

pen

Blog

Drowning in False Positives? Your Detections Probably Suck

pen

Blog

Introducing Panther’s Newest Alert Destination: Torq

pen

Blog

Panther Users Can Now Seamlessly Leverage Powerful Observo.ai Data Pipeline Features

pen

Blog

Stop Creating Dumb Alerts: See Our New AI and Correlation Rules at RSA

pen

Blog

Why You Should Be Ingesting AWS GuardDuty Logs

pen

Blog

Panther Now Integrates with Amazon Security Lake: Embracing the Open Cybersecurity Schema Framework (OCSF)

pen

Blog

Learn it Firsthand: How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity

pen

Blog

Why You Should Be Ingesting AWS CloudTrail Logs

pen

Blog

What You Need to Know About the Latest GitLab Vulnerability (Including Detection)

pen

Blog

Identifying and Mitigating False Positive Alerts

pen

Blog

Is Your SIEM a Hotel California?

pen

Blog

Unraveling SIEM Correlation Techniques

pen

Blog

CVE-2024-3094 - Linux Supply Chain Compromise Affecting XZ Utils Data Compression Library

pen

Blog

Critical Steps To Detect and Prevent Cryptojacking In Your Cloud Infrastructure

pen

Blog

How North Korean Cybercrime Aids the Russian Military and Circumvents Sanctions

pen

Blog

Mitigating the Midnight Blizzard Threat

pen

Blog

The Scattered Spider Attack: Safeguarding Your Okta Infrastructure

pen

Blog

Mastering Alert Fatigue: Best Practices for Centralized Management

pen

Blog

Securing the Cloud with Panther: Providing Multi Cloud Support Across AWS, GCP, and Azure

pen

Blog

From Vision to Reality: Panther‚s New Identity

pen

Blog

Harnessing the Power of Data Lake Search and DaC for Crypto Mining Malware Detection and Investigation

pen

Blog

Why Proactive Threat Monitoring is Crucial: Unveiling the Invisible Risks

pen

Blog

Built In Recognizes Panther as Top Workplace in Industry!

pen

Blog

Introducing the Panther Sigma Rule Converter

pen

Blog

How to Evaluate a Security Detection Platform

pen

Blog

How to Create a Code-Based Detection

pen

Blog

How Detection-as-Code Revolutionizes Security Posture

pen

Blog

Introducing Panther‚s Security Data Lake Search

pen

Blog

Panther Announces Splunk Alert Destination Integration

pen

Blog

Shifting from Reactive to Proactive Cybersecurity Postures

pen

Blog

Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity

pen

Blog

SOCtober Spook Fest: Watch All 3 Stories

pen

Blog

Collaborate with Confidence: Monitor Notion Audit Logs with Panther

pen

Blog

User Experience, the Unseen Hero in Security Products

pen

Blog

The Great Cloud-Native Fib: Unmasking a Core SIEM Deception

pen

Blog

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring

pen

Blog

A Quick and Easy Guide to Detection and Query Tuning

pen

Blog

Panther Users Can Now Manage S3 Log Sources with Terraform

pen

Blog

Monitoring Tailscale Network & Audit Logs with Panther

pen

Blog

How FloQast Transforms Security Ops with Detection-as-Code

pen

Blog

Accelerating Investigation with Panther

pen

Blog

How Panther Ensures Resilience During Cloud Outages

pen

Blog

Nation-State Actors Targeting Software Supply Chain via GitHub

pen

Blog

Hey Microsoft, Security Logs Want to be Free!

pen

Blog

Using AWS Secrets Manager with Panther Detections

pen

Blog

The Power of Detection-as-Code, For Everyone

pen

Blog

How Workrise Implemented Panther To Achieve Full Visibility

pen

Blog

Panther Recognized as Fortune Best Places to Work in the Bay Area

pen

Blog

Realize SIEM Value from Day One

pen

Blog

How Panther Helps With SOC 2

pen

Blog

Building a Detection & Response Team in a Cloud First Environment

pen

Blog

The Darksaber of Modern SIEM Tools in a Galaxy Far, Far Away

pen

Blog

Best practices for running faster SQL queries

pen

Blog

Discovering Exfiltrated Credentials

pen

Blog

Analyzing Lateral Movement in Google Cloud Platform

pen

Blog

Maximizing Endpoint Security with SentinelOne and Panther

pen

Blog

Method to the Madness: Developing a Detection Engineering Methodology

pen

Blog

Faster Triaging with Slack Bot Boomerangs

pen

Blog

Writing Your First Python Detection in 30 Minutes with Okta and Panther

pen

Blog

Zero False Positives from your SIEM

pen

Blog

Top 5 AWS Services to Protect with CloudTrail

pen

Blog

Threat Hunting in AWS

pen

Blog

Accelerate Response with the Panther Slack Bot

pen

Blog

5 Things You Need to Know About the State of SIEM in 2022

pen

Blog

Optimize CloudTrail Ingestion with Modern SIEM

pen

Blog

State of SIEM 2022: 5 Key Takeaways

pen

Blog

Get Started: AWS and Panther

pen

Blog

Protect Azure Services with Microsoft Graph API

pen

Blog

How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government

pen

Blog

Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys

pen

Blog

13 Questions with Founder and CEO Jack Naglieri in the Panther Community

pen

Blog

Adopting Real-Time Threat Detection Workflows

pen

Blog

Five Lessons From Detection & Response Leaders

pen

Blog

The Benefits of Using Python to Write SIEM Detections

pen

Blog

Join Panther’s Founder and CEO Jack Naglieri for a Community AMA!

pen

Blog

Rapid Detection and Response with Panther & Tines

pen

Blog

Modernize detection engineering with Detection-as-Code

pen

Blog

Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

pen

Blog

Think Like a Detection Engineer, Pt. 2: Rule Writing

pen

Blog

Think Like a Detection Engineer, Pt. 1: Logging

pen

Blog

Connect with Panther Users and Security Experts in the Panther Community

pen

Blog

Monitoring 1Password Logs

pen

Blog

How Panther Protects Data in the Cloud

pen

Blog

Avoiding Alert Storms with Data Replay in Panther

pen

Blog

Reflecting on what makes Panther a “Great Place to Work”

pen

Blog

Reduce false positives with GreyNoise threat intelligence in Panther

pen

Blog

Okta and LAPSUS$: Investigation Resources and How Panther Can Help

pen

Blog

Improve detection fidelity and alert triage with Lookup Tables in Panther

pen

Blog

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

Blog

The Future of Cyber Attacks — Insights From Slava Bronfman

pen

Blog

The Future of Cyber Attacks — Insights From Carlos Morales

pen

Blog

The Future of Cyber Attacks — Insights From Ashu Savani

pen

Blog

The Future of Cyber Attacks — Insights From Albert Heinle

pen

Blog

The Future of Cyber Attacks — Insights From Aliaksandr Latushka

pen

Blog

The Future of Cyber Attacks — Insights From Isla Sibanda

pen

Blog

The Future of Cyber Attacks — Insights From Matt Hartley

pen

Blog

The Future of Cyber Attacks — Insights From Hugo Sanchez

pen

Blog

The Future of Cyber Attacks — Insights From David Vincent

pen

Blog

The Future of Cyber Attacks — Insights From Giora Engel

pen

Blog

The Future of Cyber Attacks — Insights From Eslam Reda

pen

Blog

The Future of Cyber Attacks — Insights From Kimberly Sutherland

pen

Blog

The Future of Cyber Attacks — Insights From Bruce Young

pen

Blog

The Future of Cyber Attacks — Insights From Morgan Hill

pen

Blog

The Future of Cyber Attacks — Insights From Yaniv Masjedi

pen

Blog

The Future of Cyber Attacks — Insights From Haseeb Awan

pen

Blog

The Future of Cyber Attacks — Insights From Eric McGee

pen

Blog

The Future of Cyber Attacks — Insights From Steve Tcherchian

pen

Blog

The Future of Cyber Attacks — Insights From Purandar Das

pen

Blog

Panther’s guide to Log4j exploitation prevention and detection

pen

Blog

The Future of Cyber Attacks — Insights From Roger Smith

pen

Blog

The Future of Cyber Attacks — Insights From Ian L. Paterson

pen

Blog

Building the Future of Security: Panther Series B Funding

pen

Blog

The Future of Cyber Attacks — Insights From Jerry Sanchez

pen

Blog

The Future of Cyber Attacks — Insights From Chris Connor

pen

Blog

The Future of Cyber Attacks — Insights From Charlie Riley

pen

Blog

The Future of Cyber Attacks — Insights From Alex Cherones

pen

Blog

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

Blog

State of SIEM in 2021: 6 Key Takeaways

pen

Blog

The Future of Cyber Attacks — Insights From Zach Fuller

pen

Blog

The Future of Cyber Attacks — Insights From Paul Mansur

pen

Blog

Find Patterns Quickly with Indicator Search Drill Down

pen

Blog

Future of Cyber Attacks

pen

Blog

The Future of Cyber Attacks — Insights From Jonathan Roy

pen

Blog

The Future of Cyber Attacks — Insights From David Pignolet

pen

Blog

Detect Everything, Real-Time Alerts As Needed

pen

Blog

Why Panther Chose Snowflake

pen

Blog

Buy or Build Your Security Solution?

pen

Blog

Snowflake Cybersecurity Partner of The Year

pen

Blog

Going Closed Source

pen

Blog

Advanced Detections with Scheduled Queries

pen

Blog

Security Monitoring with CrowdStrike Falcon Events

pen

Blog

Activate Security Automation with Alert Context

pen

Blog

Detecting Sunburst Malware with Panther

pen

Blog

Automated Detection and Response with Panther and Tines

pen

Blog

Threat Hunting at Scale

pen

Blog

Analyze Internal Security Data with Custom Log Parsers

pen

Blog

Triage Alerts Faster with Alert Summaries

pen

Blog

Continuous Security Monitoring for Slack, Cloudflare, and Fastly

pen

Blog

From StreamAlert to Panther

pen

Blog

Panther Labs Series A Funding

pen

Blog

Why Panther Chose to Open Up Its Security Data Lake

pen

Blog

Feature Spotlight: Snowflake-Powered Data Explorer

pen

Blog

Osquery Log Analysis Guide

pen

Blog

Panther v1.6 Spotlight: Log Analysis Dashboard, SIEM for G Suite and Box Logs, SSO, Dark Theme, and more!

pen

Blog

Visualize Your AWS Cloud Security Posture with Charts and Graphs

pen

Blog

Panther and Snowflake Partner to Power Enterprise SIEM Workloads

pen

Blog

Panther’s CLI Tool

pen

Blog

Search Performance Optimizations

pen

Blog

New Log Parsers

pen

Blog

Panther Cloud-Native SIEM: Moving Beyond Traditional SIEMs

pen

Blog

Panther v1.0: Cloud-Native SIEM for Modern Security Teams

pen

Blog

RSA Conference 2020: A Recap of the Top Announcements

pen

Blog

6 AWS Services for Cloud Security Detection

pen

Blog

6 Open Source Cloud Security Tools You Should Know

pen

Blog

Announcing Panther: A Cloud-Native, Continuous Security Monitoring Platform

pen

Blog

Panther Labs Raises $4.5M to Push Cloud Security Forward

Load More

Case Studies

Webinars

Blogs

E-books

Podcasts

Briefs

pen

Panther + Wiz: Empowering SecOps Teams with Unified Context

pen

Sigma Rules: Your Guide to Threat Detection’s Open Standard

pen

Investigating Amazon EKS Privilege Escalation with PantherFlow

pen

Introducing PantherFlow: Accelerate Investigations in Your Security Data Lake

pen

How to Write Queries in PantherFlow, a Piped Search Language

pen

Panther Debuts as Wiz Defend Launch Partner

pen

Why PantherFlow: How Our Piped Query Language Simplifies Search

pen

How to Know You're Ready for a Dedicated Detections Team

pen

Python for Cybersecurity: Key Use Cases and Tools

pen

Introducing pypanther: The Future of Code-Driven Detection and Response

pen

Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024

pen

Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools

pen

5 Reasons Your Pipeline Is Broken–And How to Fix It

pen

Enhanced Identity Attack Detection with Push Security

pen

How to Turn Security Pipelines Into Gold Mines

pen

Regarding the Recent Campaign Targeting Snowflake Customers

pen

Make Your SecOps Pipe Dreams a Reality

pen

Why You Should Be Ingesting AWS VPC Flow Logs

pen

Drowning in False Positives? Your Detections Probably Suck

pen

Introducing Panther’s Newest Alert Destination: Torq

pen

Panther Users Can Now Seamlessly Leverage Powerful Observo.ai Data Pipeline Features

pen

Stop Creating Dumb Alerts: See Our New AI and Correlation Rules at RSA

pen

Why You Should Be Ingesting AWS GuardDuty Logs

pen

Panther Now Integrates with Amazon Security Lake: Embracing the Open Cybersecurity Schema Framework (OCSF)

pen

Learn it Firsthand: How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity

pen

Why You Should Be Ingesting AWS CloudTrail Logs

pen

What You Need to Know About the Latest GitLab Vulnerability (Including Detection)

pen

Identifying and Mitigating False Positive Alerts

pen

Is Your SIEM a Hotel California?

pen

Unraveling SIEM Correlation Techniques

pen

CVE-2024-3094 - Linux Supply Chain Compromise Affecting XZ Utils Data Compression Library

pen

Critical Steps To Detect and Prevent Cryptojacking In Your Cloud Infrastructure

pen

How North Korean Cybercrime Aids the Russian Military and Circumvents Sanctions

pen

Mitigating the Midnight Blizzard Threat

pen

The Scattered Spider Attack: Safeguarding Your Okta Infrastructure

pen

Mastering Alert Fatigue: Best Practices for Centralized Management

pen

Securing the Cloud with Panther: Providing Multi Cloud Support Across AWS, GCP, and Azure

pen

From Vision to Reality: Panther‚s New Identity

pen

Harnessing the Power of Data Lake Search and DaC for Crypto Mining Malware Detection and Investigation

pen

Why Proactive Threat Monitoring is Crucial: Unveiling the Invisible Risks

pen

Built In Recognizes Panther as Top Workplace in Industry!

pen

Introducing the Panther Sigma Rule Converter

pen

How to Evaluate a Security Detection Platform

pen

How to Create a Code-Based Detection

pen

How Detection-as-Code Revolutionizes Security Posture

pen

Introducing Panther‚s Security Data Lake Search

pen

Panther Announces Splunk Alert Destination Integration

pen

Shifting from Reactive to Proactive Cybersecurity Postures

pen

Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity

pen

SOCtober Spook Fest: Watch All 3 Stories

pen

Collaborate with Confidence: Monitor Notion Audit Logs with Panther

pen

User Experience, the Unseen Hero in Security Products

pen

The Great Cloud-Native Fib: Unmasking a Core SIEM Deception

pen

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring

pen

A Quick and Easy Guide to Detection and Query Tuning

pen

Panther Users Can Now Manage S3 Log Sources with Terraform

pen

Monitoring Tailscale Network & Audit Logs with Panther

pen

How FloQast Transforms Security Ops with Detection-as-Code

pen

Accelerating Investigation with Panther

pen

How Panther Ensures Resilience During Cloud Outages

pen

Nation-State Actors Targeting Software Supply Chain via GitHub

pen

Hey Microsoft, Security Logs Want to be Free!

pen

Using AWS Secrets Manager with Panther Detections

pen

The Power of Detection-as-Code, For Everyone

pen

How Workrise Implemented Panther To Achieve Full Visibility

pen

Panther Recognized as Fortune Best Places to Work in the Bay Area

pen

Realize SIEM Value from Day One

pen

How Panther Helps With SOC 2

pen

Building a Detection & Response Team in a Cloud First Environment

pen

The Darksaber of Modern SIEM Tools in a Galaxy Far, Far Away

pen

Best practices for running faster SQL queries

pen

Discovering Exfiltrated Credentials

pen

Analyzing Lateral Movement in Google Cloud Platform

pen

Maximizing Endpoint Security with SentinelOne and Panther

pen

Method to the Madness: Developing a Detection Engineering Methodology

pen

Faster Triaging with Slack Bot Boomerangs

pen

Writing Your First Python Detection in 30 Minutes with Okta and Panther

pen

Zero False Positives from your SIEM

pen

Top 5 AWS Services to Protect with CloudTrail

pen

Threat Hunting in AWS

pen

Accelerate Response with the Panther Slack Bot

pen

5 Things You Need to Know About the State of SIEM in 2022

pen

Optimize CloudTrail Ingestion with Modern SIEM

pen

State of SIEM 2022: 5 Key Takeaways

pen

Get Started: AWS and Panther

pen

Protect Azure Services with Microsoft Graph API

pen

How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government

pen

Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys

pen

13 Questions with Founder and CEO Jack Naglieri in the Panther Community

pen

Adopting Real-Time Threat Detection Workflows

pen

Five Lessons From Detection & Response Leaders

pen

The Benefits of Using Python to Write SIEM Detections

pen

Join Panther’s Founder and CEO Jack Naglieri for a Community AMA!

pen

Rapid Detection and Response with Panther & Tines

pen

Modernize detection engineering with Detection-as-Code

pen

Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

pen

Think Like a Detection Engineer, Pt. 2: Rule Writing

pen

Think Like a Detection Engineer, Pt. 1: Logging

pen

Connect with Panther Users and Security Experts in the Panther Community

pen

Monitoring 1Password Logs

pen

How Panther Protects Data in the Cloud

pen

Avoiding Alert Storms with Data Replay in Panther

pen

Reflecting on what makes Panther a “Great Place to Work”

pen

Reduce false positives with GreyNoise threat intelligence in Panther

pen

Okta and LAPSUS$: Investigation Resources and How Panther Can Help

pen

Improve detection fidelity and alert triage with Lookup Tables in Panther

pen

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

The Future of Cyber Attacks — Insights From Slava Bronfman

pen

The Future of Cyber Attacks — Insights From Carlos Morales

pen

The Future of Cyber Attacks — Insights From Ashu Savani

pen

The Future of Cyber Attacks — Insights From Albert Heinle

pen

The Future of Cyber Attacks — Insights From Aliaksandr Latushka

pen

The Future of Cyber Attacks — Insights From Isla Sibanda

pen

The Future of Cyber Attacks — Insights From Matt Hartley

pen

The Future of Cyber Attacks — Insights From Hugo Sanchez

pen

The Future of Cyber Attacks — Insights From David Vincent

pen

The Future of Cyber Attacks — Insights From Giora Engel

pen

The Future of Cyber Attacks — Insights From Eslam Reda

pen

The Future of Cyber Attacks — Insights From Kimberly Sutherland

pen

The Future of Cyber Attacks — Insights From Bruce Young

pen

The Future of Cyber Attacks — Insights From Morgan Hill

pen

The Future of Cyber Attacks — Insights From Yaniv Masjedi

pen

The Future of Cyber Attacks — Insights From Haseeb Awan

pen

The Future of Cyber Attacks — Insights From Eric McGee

pen

The Future of Cyber Attacks — Insights From Steve Tcherchian

pen

The Future of Cyber Attacks — Insights From Purandar Das

pen

Panther’s guide to Log4j exploitation prevention and detection

pen

The Future of Cyber Attacks — Insights From Roger Smith

pen

The Future of Cyber Attacks — Insights From Ian L. Paterson

pen

Building the Future of Security: Panther Series B Funding

pen

The Future of Cyber Attacks — Insights From Jerry Sanchez

pen

The Future of Cyber Attacks — Insights From Chris Connor

pen

The Future of Cyber Attacks — Insights From Charlie Riley

pen

The Future of Cyber Attacks — Insights From Alex Cherones

pen

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

State of SIEM in 2021: 6 Key Takeaways

pen

The Future of Cyber Attacks — Insights From Zach Fuller

pen

The Future of Cyber Attacks — Insights From Paul Mansur

pen

Find Patterns Quickly with Indicator Search Drill Down

pen

Future of Cyber Attacks

pen

The Future of Cyber Attacks — Insights From Jonathan Roy

pen

The Future of Cyber Attacks — Insights From David Pignolet

pen

Detect Everything, Real-Time Alerts As Needed

pen

Why Panther Chose Snowflake

pen

Buy or Build Your Security Solution?

pen

Snowflake Cybersecurity Partner of The Year

pen

Going Closed Source

pen

Advanced Detections with Scheduled Queries

pen

Security Monitoring with CrowdStrike Falcon Events

pen

Activate Security Automation with Alert Context

pen

Detecting Sunburst Malware with Panther

pen

Automated Detection and Response with Panther and Tines

pen

Threat Hunting at Scale

pen

Analyze Internal Security Data with Custom Log Parsers

pen

Triage Alerts Faster with Alert Summaries

pen

Continuous Security Monitoring for Slack, Cloudflare, and Fastly

pen

From StreamAlert to Panther

pen

Panther Labs Series A Funding

pen

Why Panther Chose to Open Up Its Security Data Lake

pen

Feature Spotlight: Snowflake-Powered Data Explorer

pen

Osquery Log Analysis Guide

pen

Panther v1.6 Spotlight: Log Analysis Dashboard, SIEM for G Suite and Box Logs, SSO, Dark Theme, and more!

pen

Visualize Your AWS Cloud Security Posture with Charts and Graphs

pen

Panther and Snowflake Partner to Power Enterprise SIEM Workloads

pen

Panther’s CLI Tool

pen

Search Performance Optimizations

pen

New Log Parsers

pen

Panther Cloud-Native SIEM: Moving Beyond Traditional SIEMs

pen

Panther v1.0: Cloud-Native SIEM for Modern Security Teams

pen

RSA Conference 2020: A Recap of the Top Announcements

pen

6 AWS Services for Cloud Security Detection

pen

6 Open Source Cloud Security Tools You Should Know

pen

Announcing Panther: A Cloud-Native, Continuous Security Monitoring Platform

pen

Panther Labs Raises $4.5M to Push Cloud Security Forward

Load More

Case Studies

Webinars

Blogs

E-books

Podcasts

Briefs

pen

Blog

Panther + Wiz: Empowering SecOps Teams with Unified Context

pen

Blog

Sigma Rules: Your Guide to Threat Detection’s Open Standard

pen

Blog

Investigating Amazon EKS Privilege Escalation with PantherFlow

pen

Blog

Introducing PantherFlow: Accelerate Investigations in Your Security Data Lake

pen

Blog

How to Write Queries in PantherFlow, a Piped Search Language

pen

Blog

Panther Debuts as Wiz Defend Launch Partner

pen

Blog

Why PantherFlow: How Our Piped Query Language Simplifies Search

pen

Blog

How to Know You're Ready for a Dedicated Detections Team

pen

Blog

Python for Cybersecurity: Key Use Cases and Tools

pen

Blog

Introducing pypanther: The Future of Code-Driven Detection and Response

pen

Blog

Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024

pen

Blog

Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools

pen

Blog

5 Reasons Your Pipeline Is Broken–And How to Fix It

pen

Blog

Enhanced Identity Attack Detection with Push Security

pen

Blog

How to Turn Security Pipelines Into Gold Mines

pen

Blog

Regarding the Recent Campaign Targeting Snowflake Customers

pen

Blog

Make Your SecOps Pipe Dreams a Reality

pen

Blog

Why You Should Be Ingesting AWS VPC Flow Logs

pen

Blog

Drowning in False Positives? Your Detections Probably Suck

pen

Blog

Introducing Panther’s Newest Alert Destination: Torq

pen

Blog

Panther Users Can Now Seamlessly Leverage Powerful Observo.ai Data Pipeline Features

pen

Blog

Stop Creating Dumb Alerts: See Our New AI and Correlation Rules at RSA

pen

Blog

Why You Should Be Ingesting AWS GuardDuty Logs

pen

Blog

Panther Now Integrates with Amazon Security Lake: Embracing the Open Cybersecurity Schema Framework (OCSF)

pen

Blog

Learn it Firsthand: How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity

pen

Blog

Why You Should Be Ingesting AWS CloudTrail Logs

pen

Blog

What You Need to Know About the Latest GitLab Vulnerability (Including Detection)

pen

Blog

Identifying and Mitigating False Positive Alerts

pen

Blog

Is Your SIEM a Hotel California?

pen

Blog

Unraveling SIEM Correlation Techniques

pen

Blog

CVE-2024-3094 - Linux Supply Chain Compromise Affecting XZ Utils Data Compression Library

pen

Blog

Critical Steps To Detect and Prevent Cryptojacking In Your Cloud Infrastructure

pen

Blog

How North Korean Cybercrime Aids the Russian Military and Circumvents Sanctions

pen

Blog

Mitigating the Midnight Blizzard Threat

pen

Blog

The Scattered Spider Attack: Safeguarding Your Okta Infrastructure

pen

Blog

Mastering Alert Fatigue: Best Practices for Centralized Management

pen

Blog

Securing the Cloud with Panther: Providing Multi Cloud Support Across AWS, GCP, and Azure

pen

Blog

From Vision to Reality: Panther‚s New Identity

pen

Blog

Harnessing the Power of Data Lake Search and DaC for Crypto Mining Malware Detection and Investigation

pen

Blog

Why Proactive Threat Monitoring is Crucial: Unveiling the Invisible Risks

pen

Blog

Built In Recognizes Panther as Top Workplace in Industry!

pen

Blog

Introducing the Panther Sigma Rule Converter

pen

Blog

How to Evaluate a Security Detection Platform

pen

Blog

How to Create a Code-Based Detection

pen

Blog

How Detection-as-Code Revolutionizes Security Posture

pen

Blog

Introducing Panther‚s Security Data Lake Search

pen

Blog

Panther Announces Splunk Alert Destination Integration

pen

Blog

Shifting from Reactive to Proactive Cybersecurity Postures

pen

Blog

Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity

pen

Blog

SOCtober Spook Fest: Watch All 3 Stories

pen

Blog

Collaborate with Confidence: Monitor Notion Audit Logs with Panther

pen

Blog

User Experience, the Unseen Hero in Security Products

pen

Blog

The Great Cloud-Native Fib: Unmasking a Core SIEM Deception

pen

Blog

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring

pen

Blog

A Quick and Easy Guide to Detection and Query Tuning

pen

Blog

Panther Users Can Now Manage S3 Log Sources with Terraform

pen

Blog

Monitoring Tailscale Network & Audit Logs with Panther

pen

Blog

How FloQast Transforms Security Ops with Detection-as-Code

pen

Blog

Accelerating Investigation with Panther

pen

Blog

How Panther Ensures Resilience During Cloud Outages

pen

Blog

Nation-State Actors Targeting Software Supply Chain via GitHub

pen

Blog

Hey Microsoft, Security Logs Want to be Free!

pen

Blog

Using AWS Secrets Manager with Panther Detections

pen

Blog

The Power of Detection-as-Code, For Everyone

pen

Blog

How Workrise Implemented Panther To Achieve Full Visibility

pen

Blog

Panther Recognized as Fortune Best Places to Work in the Bay Area

pen

Blog

Realize SIEM Value from Day One

pen

Blog

How Panther Helps With SOC 2

pen

Blog

Building a Detection & Response Team in a Cloud First Environment

pen

Blog

The Darksaber of Modern SIEM Tools in a Galaxy Far, Far Away

pen

Blog

Best practices for running faster SQL queries

pen

Blog

Discovering Exfiltrated Credentials

pen

Blog

Analyzing Lateral Movement in Google Cloud Platform

pen

Blog

Maximizing Endpoint Security with SentinelOne and Panther

pen

Blog

Method to the Madness: Developing a Detection Engineering Methodology

pen

Blog

Faster Triaging with Slack Bot Boomerangs

pen

Blog

Writing Your First Python Detection in 30 Minutes with Okta and Panther

pen

Blog

Zero False Positives from your SIEM

pen

Blog

Top 5 AWS Services to Protect with CloudTrail

pen

Blog

Threat Hunting in AWS

pen

Blog

Accelerate Response with the Panther Slack Bot

pen

Blog

5 Things You Need to Know About the State of SIEM in 2022

pen

Blog

Optimize CloudTrail Ingestion with Modern SIEM

pen

Blog

State of SIEM 2022: 5 Key Takeaways

pen

Blog

Get Started: AWS and Panther

pen

Blog

Protect Azure Services with Microsoft Graph API

pen

Blog

How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government

pen

Blog

Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys

pen

Blog

13 Questions with Founder and CEO Jack Naglieri in the Panther Community

pen

Blog

Adopting Real-Time Threat Detection Workflows

pen

Blog

Five Lessons From Detection & Response Leaders

pen

Blog

The Benefits of Using Python to Write SIEM Detections

pen

Blog

Join Panther’s Founder and CEO Jack Naglieri for a Community AMA!

pen

Blog

Rapid Detection and Response with Panther & Tines

pen

Blog

Modernize detection engineering with Detection-as-Code

pen

Blog

Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

pen

Blog

Think Like a Detection Engineer, Pt. 2: Rule Writing

pen

Blog

Think Like a Detection Engineer, Pt. 1: Logging

pen

Blog

Connect with Panther Users and Security Experts in the Panther Community

pen

Blog

Monitoring 1Password Logs

pen

Blog

How Panther Protects Data in the Cloud

pen

Blog

Avoiding Alert Storms with Data Replay in Panther

pen

Blog

Reflecting on what makes Panther a “Great Place to Work”

pen

Blog

Reduce false positives with GreyNoise threat intelligence in Panther

pen

Blog

Okta and LAPSUS$: Investigation Resources and How Panther Can Help

pen

Blog

Improve detection fidelity and alert triage with Lookup Tables in Panther

pen

Blog

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

Blog

The Future of Cyber Attacks — Insights From Slava Bronfman

pen

Blog

The Future of Cyber Attacks — Insights From Carlos Morales

pen

Blog

The Future of Cyber Attacks — Insights From Ashu Savani

pen

Blog

The Future of Cyber Attacks — Insights From Albert Heinle

pen

Blog

The Future of Cyber Attacks — Insights From Aliaksandr Latushka

pen

Blog

The Future of Cyber Attacks — Insights From Isla Sibanda

pen

Blog

The Future of Cyber Attacks — Insights From Matt Hartley

pen

Blog

The Future of Cyber Attacks — Insights From Hugo Sanchez

pen

Blog

The Future of Cyber Attacks — Insights From David Vincent

pen

Blog

The Future of Cyber Attacks — Insights From Giora Engel

pen

Blog

The Future of Cyber Attacks — Insights From Eslam Reda

pen

Blog

The Future of Cyber Attacks — Insights From Kimberly Sutherland

pen

Blog

The Future of Cyber Attacks — Insights From Bruce Young

pen

Blog

The Future of Cyber Attacks — Insights From Morgan Hill

pen

Blog

The Future of Cyber Attacks — Insights From Yaniv Masjedi

pen

Blog

The Future of Cyber Attacks — Insights From Haseeb Awan

pen

Blog

The Future of Cyber Attacks — Insights From Eric McGee

pen

Blog

The Future of Cyber Attacks — Insights From Steve Tcherchian

pen

Blog

The Future of Cyber Attacks — Insights From Purandar Das

pen

Blog

Panther’s guide to Log4j exploitation prevention and detection

pen

Blog

The Future of Cyber Attacks — Insights From Roger Smith

pen

Blog

The Future of Cyber Attacks — Insights From Ian L. Paterson

pen

Blog

Building the Future of Security: Panther Series B Funding

pen

Blog

The Future of Cyber Attacks — Insights From Jerry Sanchez

pen

Blog

The Future of Cyber Attacks — Insights From Chris Connor

pen

Blog

The Future of Cyber Attacks — Insights From Charlie Riley

pen

Blog

The Future of Cyber Attacks — Insights From Alex Cherones

pen

Blog

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

Blog

State of SIEM in 2021: 6 Key Takeaways

pen

Blog

The Future of Cyber Attacks — Insights From Zach Fuller

pen

Blog

The Future of Cyber Attacks — Insights From Paul Mansur

pen

Blog

Find Patterns Quickly with Indicator Search Drill Down

pen

Blog

Future of Cyber Attacks

pen

Blog

The Future of Cyber Attacks — Insights From Jonathan Roy

pen

Blog

The Future of Cyber Attacks — Insights From David Pignolet

pen

Blog

Detect Everything, Real-Time Alerts As Needed

pen

Blog

Why Panther Chose Snowflake

pen

Blog

Buy or Build Your Security Solution?

pen

Blog

Snowflake Cybersecurity Partner of The Year

pen

Blog

Going Closed Source

pen

Blog

Advanced Detections with Scheduled Queries

pen

Blog

Security Monitoring with CrowdStrike Falcon Events

pen

Blog

Activate Security Automation with Alert Context

pen

Blog

Detecting Sunburst Malware with Panther

pen

Blog

Automated Detection and Response with Panther and Tines

pen

Blog

Threat Hunting at Scale

pen

Blog

Analyze Internal Security Data with Custom Log Parsers

pen

Blog

Triage Alerts Faster with Alert Summaries

pen

Blog

Continuous Security Monitoring for Slack, Cloudflare, and Fastly

pen

Blog

From StreamAlert to Panther

pen

Blog

Panther Labs Series A Funding

pen

Blog

Why Panther Chose to Open Up Its Security Data Lake

pen

Blog

Feature Spotlight: Snowflake-Powered Data Explorer

pen

Blog

Osquery Log Analysis Guide

pen

Blog

Panther v1.6 Spotlight: Log Analysis Dashboard, SIEM for G Suite and Box Logs, SSO, Dark Theme, and more!

pen

Blog

Visualize Your AWS Cloud Security Posture with Charts and Graphs

pen

Blog

Panther and Snowflake Partner to Power Enterprise SIEM Workloads

pen

Blog

Panther’s CLI Tool

pen

Blog

Search Performance Optimizations

pen

Blog

New Log Parsers

pen

Blog

Panther Cloud-Native SIEM: Moving Beyond Traditional SIEMs

pen

Blog

Panther v1.0: Cloud-Native SIEM for Modern Security Teams

pen

Blog

RSA Conference 2020: A Recap of the Top Announcements

pen

Blog

6 AWS Services for Cloud Security Detection

pen

Blog

6 Open Source Cloud Security Tools You Should Know

pen

Blog

Announcing Panther: A Cloud-Native, Continuous Security Monitoring Platform

pen

Blog

Panther Labs Raises $4.5M to Push Cloud Security Forward

Load More

Case Studies

Webinars

Blogs

E-books

Podcasts

Briefs

pen

Panther + Wiz: Empowering SecOps Teams with Unified Context

pen

Sigma Rules: Your Guide to Threat Detection’s Open Standard

pen

Investigating Amazon EKS Privilege Escalation with PantherFlow

pen

Introducing PantherFlow: Accelerate Investigations in Your Security Data Lake

pen

How to Write Queries in PantherFlow, a Piped Search Language

pen

Panther Debuts as Wiz Defend Launch Partner

pen

Why PantherFlow: How Our Piped Query Language Simplifies Search

pen

How to Know You're Ready for a Dedicated Detections Team

pen

Python for Cybersecurity: Key Use Cases and Tools

pen

Introducing pypanther: The Future of Code-Driven Detection and Response

pen

Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024

pen

Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools

pen

5 Reasons Your Pipeline Is Broken–And How to Fix It

pen

Enhanced Identity Attack Detection with Push Security

pen

How to Turn Security Pipelines Into Gold Mines

pen

Regarding the Recent Campaign Targeting Snowflake Customers

pen

Make Your SecOps Pipe Dreams a Reality

pen

Why You Should Be Ingesting AWS VPC Flow Logs

pen

Drowning in False Positives? Your Detections Probably Suck

pen

Introducing Panther’s Newest Alert Destination: Torq

pen

Panther Users Can Now Seamlessly Leverage Powerful Observo.ai Data Pipeline Features

pen

Stop Creating Dumb Alerts: See Our New AI and Correlation Rules at RSA

pen

Why You Should Be Ingesting AWS GuardDuty Logs

pen

Panther Now Integrates with Amazon Security Lake: Embracing the Open Cybersecurity Schema Framework (OCSF)

pen

Learn it Firsthand: How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity

pen

Why You Should Be Ingesting AWS CloudTrail Logs

pen

What You Need to Know About the Latest GitLab Vulnerability (Including Detection)

pen

Identifying and Mitigating False Positive Alerts

pen

Is Your SIEM a Hotel California?

pen

Unraveling SIEM Correlation Techniques

pen

CVE-2024-3094 - Linux Supply Chain Compromise Affecting XZ Utils Data Compression Library

pen

Critical Steps To Detect and Prevent Cryptojacking In Your Cloud Infrastructure

pen

How North Korean Cybercrime Aids the Russian Military and Circumvents Sanctions

pen

Mitigating the Midnight Blizzard Threat

pen

The Scattered Spider Attack: Safeguarding Your Okta Infrastructure

pen

Mastering Alert Fatigue: Best Practices for Centralized Management

pen

Securing the Cloud with Panther: Providing Multi Cloud Support Across AWS, GCP, and Azure

pen

From Vision to Reality: Panther‚s New Identity

pen

Harnessing the Power of Data Lake Search and DaC for Crypto Mining Malware Detection and Investigation

pen

Why Proactive Threat Monitoring is Crucial: Unveiling the Invisible Risks

pen

Built In Recognizes Panther as Top Workplace in Industry!

pen

Introducing the Panther Sigma Rule Converter

pen

How to Evaluate a Security Detection Platform

pen

How to Create a Code-Based Detection

pen

How Detection-as-Code Revolutionizes Security Posture

pen

Introducing Panther‚s Security Data Lake Search

pen

Panther Announces Splunk Alert Destination Integration

pen

Shifting from Reactive to Proactive Cybersecurity Postures

pen

Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity

pen

SOCtober Spook Fest: Watch All 3 Stories

pen

Collaborate with Confidence: Monitor Notion Audit Logs with Panther

pen

User Experience, the Unseen Hero in Security Products

pen

The Great Cloud-Native Fib: Unmasking a Core SIEM Deception

pen

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring

pen

A Quick and Easy Guide to Detection and Query Tuning

pen

Panther Users Can Now Manage S3 Log Sources with Terraform

pen

Monitoring Tailscale Network & Audit Logs with Panther

pen

How FloQast Transforms Security Ops with Detection-as-Code

pen

Accelerating Investigation with Panther

pen

How Panther Ensures Resilience During Cloud Outages

pen

Nation-State Actors Targeting Software Supply Chain via GitHub

pen

Hey Microsoft, Security Logs Want to be Free!

pen

Using AWS Secrets Manager with Panther Detections

pen

The Power of Detection-as-Code, For Everyone

pen

How Workrise Implemented Panther To Achieve Full Visibility

pen

Panther Recognized as Fortune Best Places to Work in the Bay Area

pen

Realize SIEM Value from Day One

pen

How Panther Helps With SOC 2

pen

Building a Detection & Response Team in a Cloud First Environment

pen

The Darksaber of Modern SIEM Tools in a Galaxy Far, Far Away

pen

Best practices for running faster SQL queries

pen

Discovering Exfiltrated Credentials

pen

Analyzing Lateral Movement in Google Cloud Platform

pen

Maximizing Endpoint Security with SentinelOne and Panther

pen

Method to the Madness: Developing a Detection Engineering Methodology

pen

Faster Triaging with Slack Bot Boomerangs

pen

Writing Your First Python Detection in 30 Minutes with Okta and Panther

pen

Zero False Positives from your SIEM

pen

Top 5 AWS Services to Protect with CloudTrail

pen

Threat Hunting in AWS

pen

Accelerate Response with the Panther Slack Bot

pen

5 Things You Need to Know About the State of SIEM in 2022

pen

Optimize CloudTrail Ingestion with Modern SIEM

pen

State of SIEM 2022: 5 Key Takeaways

pen

Get Started: AWS and Panther

pen

Protect Azure Services with Microsoft Graph API

pen

How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government

pen

Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys

pen

13 Questions with Founder and CEO Jack Naglieri in the Panther Community

pen

Adopting Real-Time Threat Detection Workflows

pen

Five Lessons From Detection & Response Leaders

pen

The Benefits of Using Python to Write SIEM Detections

pen

Join Panther’s Founder and CEO Jack Naglieri for a Community AMA!

pen

Rapid Detection and Response with Panther & Tines

pen

Modernize detection engineering with Detection-as-Code

pen

Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM

pen

Think Like a Detection Engineer, Pt. 2: Rule Writing

pen

Think Like a Detection Engineer, Pt. 1: Logging

pen

Connect with Panther Users and Security Experts in the Panther Community

pen

Monitoring 1Password Logs

pen

How Panther Protects Data in the Cloud

pen

Avoiding Alert Storms with Data Replay in Panther

pen

Reflecting on what makes Panther a “Great Place to Work”

pen

Reduce false positives with GreyNoise threat intelligence in Panther

pen

Okta and LAPSUS$: Investigation Resources and How Panther Can Help

pen

Improve detection fidelity and alert triage with Lookup Tables in Panther

pen

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

The Future of Cyber Attacks — Insights From Slava Bronfman

pen

The Future of Cyber Attacks — Insights From Carlos Morales

pen

The Future of Cyber Attacks — Insights From Ashu Savani

pen

The Future of Cyber Attacks — Insights From Albert Heinle

pen

The Future of Cyber Attacks — Insights From Aliaksandr Latushka

pen

The Future of Cyber Attacks — Insights From Isla Sibanda

pen

The Future of Cyber Attacks — Insights From Matt Hartley

pen

The Future of Cyber Attacks — Insights From Hugo Sanchez

pen

The Future of Cyber Attacks — Insights From David Vincent

pen

The Future of Cyber Attacks — Insights From Giora Engel

pen

The Future of Cyber Attacks — Insights From Eslam Reda

pen

The Future of Cyber Attacks — Insights From Kimberly Sutherland

pen

The Future of Cyber Attacks — Insights From Bruce Young

pen

The Future of Cyber Attacks — Insights From Morgan Hill

pen

The Future of Cyber Attacks — Insights From Yaniv Masjedi

pen

The Future of Cyber Attacks — Insights From Haseeb Awan

pen

The Future of Cyber Attacks — Insights From Eric McGee

pen

The Future of Cyber Attacks — Insights From Steve Tcherchian

pen

The Future of Cyber Attacks — Insights From Purandar Das

pen

Panther’s guide to Log4j exploitation prevention and detection

pen

The Future of Cyber Attacks — Insights From Roger Smith

pen

The Future of Cyber Attacks — Insights From Ian L. Paterson

pen

Building the Future of Security: Panther Series B Funding

pen

The Future of Cyber Attacks — Insights From Jerry Sanchez

pen

The Future of Cyber Attacks — Insights From Chris Connor

pen

The Future of Cyber Attacks — Insights From Charlie Riley

pen

The Future of Cyber Attacks — Insights From Alex Cherones

pen

The Future of Cyber Attacks — Insights From Bill Lawrence

pen

State of SIEM in 2021: 6 Key Takeaways

pen

The Future of Cyber Attacks — Insights From Zach Fuller

pen

The Future of Cyber Attacks — Insights From Paul Mansur

pen

Find Patterns Quickly with Indicator Search Drill Down

pen

Future of Cyber Attacks

pen

The Future of Cyber Attacks — Insights From Jonathan Roy

pen

The Future of Cyber Attacks — Insights From David Pignolet

pen

Detect Everything, Real-Time Alerts As Needed

pen

Why Panther Chose Snowflake

pen

Buy or Build Your Security Solution?

pen

Snowflake Cybersecurity Partner of The Year

pen

Going Closed Source

pen

Advanced Detections with Scheduled Queries

pen

Security Monitoring with CrowdStrike Falcon Events

pen

Activate Security Automation with Alert Context

pen

Detecting Sunburst Malware with Panther

pen

Automated Detection and Response with Panther and Tines

pen

Threat Hunting at Scale

pen

Analyze Internal Security Data with Custom Log Parsers

pen

Triage Alerts Faster with Alert Summaries

pen

Continuous Security Monitoring for Slack, Cloudflare, and Fastly

pen

From StreamAlert to Panther

pen

Panther Labs Series A Funding

pen

Why Panther Chose to Open Up Its Security Data Lake

pen

Feature Spotlight: Snowflake-Powered Data Explorer

pen

Osquery Log Analysis Guide

pen

Panther v1.6 Spotlight: Log Analysis Dashboard, SIEM for G Suite and Box Logs, SSO, Dark Theme, and more!

pen

Visualize Your AWS Cloud Security Posture with Charts and Graphs

pen

Panther and Snowflake Partner to Power Enterprise SIEM Workloads

pen

Panther’s CLI Tool

pen

Search Performance Optimizations

pen

New Log Parsers

pen

Panther Cloud-Native SIEM: Moving Beyond Traditional SIEMs

pen

Panther v1.0: Cloud-Native SIEM for Modern Security Teams

pen

RSA Conference 2020: A Recap of the Top Announcements

pen

6 AWS Services for Cloud Security Detection

pen

6 Open Source Cloud Security Tools You Should Know

pen

Announcing Panther: A Cloud-Native, Continuous Security Monitoring Platform

pen

Panther Labs Raises $4.5M to Push Cloud Security Forward

Load More