
Best practices for running faster SQL queries
In this blog, we explore the power of querying normalized data in Panther and share principles to efficiently write SQL queries.

Discovering Exfiltrated Credentials
This blog explains how to proactively detect unauthorized use of authentication tokens in CI/CD systems by querying your security data lake.

Analyzing Lateral Movement in Google Cloud Platform
Discover how to harness Panther's latest GCP integrations and detections to discover lateral movement in your systems.

Simplifying Search with Query Builder
With the introduction of Query Builder, security teams can access their data quickly and effectively, regardless of their technical skill set.

Maximizing Endpoint Security with SentinelOne and Panther
This blog reviews the new integration between SentinelOne and Panther and highlights how it can secure your organization's endpoints.

Faster Triaging with Slack Bot Boomerangs
To make gathering relevant context around alerts more seamless, Panther is introducing Slack Bot Boomerangs, which allows security teams to send interactive messages right from an alert thread in Slack.

Method to the Madness: Developing a Detection Engineering Methodology
When writing detections, it is essential to develop a methodology that incorporates threat modeling, input from security incidents, threat intelligence, threat hunting, and red/purple team activities.