Get Started: AWS and Panther
Panther can efficiently ingest, normalize, and structure AWS logs so that security teams...




Protect Azure Services with Microsoft Graph API
With the massive expansion of SaaS adoption over the last decade, there has...




How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government
Learn how detection-as-code allowed centralizing detection logic and reduced team fatigue for security...


Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys
In this blog, we will cover how Panther deployed phishless FIDO2 (WebAuthn) security...

