
The Great Cloud-Native Fib: Unmasking a Core SIEM Deception
Why it is crucial to differentiate between true cloud-native solutions and those that have been retrofitted and re-architected for cloud deployment.

Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring
Delving into the evolving landscape of SIEM data sources, this article underscores the rising significance of Cloud and DevOps-related data, exemplified by GitHub, and underscores the importance of vigilant monitoring to safeguard organizations' critical code assets in the face of evolving threats.

A Quick and Easy Guide to Detection and Query Tuning
How embracing Panther's detection-as-code principles empowers organizations to stay ahead of threats by fine-tuning and optimizing their security content for their unique environment.

Monitoring Tailscale Network & Audit Logs with Panther
Panther is thrilled to announce a powerful new integration with Tailscale. This cutting-edge collaboration enables users to stream logs directly from Tailscale to Panther.

How FloQast Transforms Security Ops with Detection-as-Code
Learn how FloQast used the out-of-the-box detections as well as easily translated pre-written detections from other platforms.

Accelerating Investigation with Panther
Learn how Panther empowers your investigations with enrichment, cross-log searching, and visualized results.