The Great Cloud-Native Fib: Unmasking a Core SIEM Deception
Why it is crucial to differentiate between true cloud-native solutions and those that have been retrofitted and re-architected for cloud deployment.
Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring
Delving into the evolving landscape of SIEM data sources, this article underscores the rising significance of Cloud and DevOps-related data, exemplified by GitHub, and underscores the importance of vigilant monitoring to safeguard organizations' critical code assets in the face of evolving threats.
A Quick and Easy Guide to Detection and Query Tuning
How embracing Panther's detection-as-code principles empowers organizations to stay ahead of threats by fine-tuning and optimizing their security content for their unique environment.
Monitoring Tailscale Network & Audit Logs with Panther
Panther is thrilled to announce a powerful new integration with Tailscale. This cutting-edge collaboration enables users to stream logs directly from Tailscale to Panther.
How FloQast Transforms Security Ops with Detection-as-Code
Learn how FloQast used the out-of-the-box detections as well as easily translated pre-written detections from other platforms.
Accelerating Investigation with Panther
Learn how Panther empowers your investigations with enrichment, cross-log searching, and visualized results.
How Panther Ensures Resilience During Cloud Outages
Discover how Panther's architecture and engineering principles ensure the safety of customer data even when faced with a major outage.