Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools
![](https://panther.com/wp-content/uploads/2024/07/Zoom-Ingest-700x394.jpg)
Podcast
WP Engine’s Christopher Watkins on Cost-Effective Threat Hunting Strategies
![](https://panther.com/wp-content/uploads/2024/07/DaS_Podcast-WebThumbnail__ChrisWatkins-700x394.jpg)
Podcast
Elastic’s Darren LaCasse on Cutting Alert Volumes in Half By Automating Responses
![](https://panther.com/wp-content/uploads/2024/06/DaS_Podcast-WebThumbnail__DarrenLaCasse-700x394.jpg)
Blog
5 Reasons Your Pipeline Is Broken–And How to Fix It
![](https://panther.com/wp-content/uploads/2024/06/5-reasons-700x394.jpg)
Blog
Enhanced Identity Attack Detection with Push Security
![](https://panther.com/wp-content/uploads/2024/06/Panther-_-Push-Blog-Thumbnail-700x394.jpg)
e-Book
Guardians of Valora
![](https://panther.com/wp-content/uploads/2024/06/DAC-Comic-Book-Thumbnail-700x394.png)
Brief
Code-First, AWS-Native SIEM
![](https://panther.com/wp-content/uploads/2021/09/Panther-AWS-SB-Thumbnail-2-700x394.jpg)
Blog
How to Turn Security Pipelines Into Gold Mines
![](https://panther.com/wp-content/uploads/2024/06/Gold-Mine-700x394.jpg)