Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Securing Zoom: How to Detect and Mitigate Threats in Remote Collaboration Tools
Blog
5 Reasons Your Pipeline Is Broken–And How to Fix It
Blog
Enhanced Identity Attack Detection with Push Security
Blog
How to Turn Security Pipelines Into Gold Mines
Blog
Make Your SecOps Pipe Dreams a Reality
Blog
DaC-Driven CI/CD: Mastering GitHub Actions and Workflows
Blog
Why You Should Be Ingesting AWS VPC Flow Logs
Blog
Drowning in False Positives? Your Detections Probably Suck