Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Turn Up the Volume, Turn Down the Noise with Code-Driven Correlations at Black Hat 2024
Blog
Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools
Blog
5 Reasons Your Pipeline Is Broken–And How to Fix It
Blog
Enhanced Identity Attack Detection with Push Security
Blog
How to Turn Security Pipelines Into Gold Mines
Blog
Make Your SecOps Pipe Dreams a Reality
Blog
DaC-Driven CI/CD: Mastering GitHub Actions and Workflows
Blog
Why You Should Be Ingesting AWS VPC Flow Logs