State of SIEM 2022: 5 Key Takeaways
In this article, we explore five of the most pressing challenges faced by security teams today and how SIEM can help address them.
Get Started: AWS and Panther
In this blog, we use S3 Server Access logs of as an example to show how to onboard and implement detections on AWS logs in Panther.
Protect Azure Services with Microsoft Graph API
In this article, we discuss the different Azure and Microsoft services that Panther can integrate with through the Graph API.
How Booz Allen Hamilton uses Detection-as-Code to Transform Security in the Federal Government
Learn how detection-as-code allowed centralizing detection logic and reduced team fatigue for security teams in the Federal Government.
Going Phishless: How Panther Deployed WebAuthN with Okta & YubiKeys
This blog details how Panther deployed phishless FIDO2 (WebAuthn) security keys, including details on the hardware, software, and steps taken.
13 Questions with Founder and CEO Jack Naglieri in the Panther Community
We're sharing 13 questions and answers from the recently held an ask-me-anything (AMA) session with Panther CEO Jack Naglieri.
Adopting Real-Time Threat Detection Workflows
Real-time threat detection is the practice of analyzing event data for malicious activity the instant it’s generated by the event source.
Five Lessons From Detection & Response Leaders
This post details five detection and response lessons from 20+ conversations with CISOs, SecOps managers, engineers, and analysts from Netflix, Dropbox, and more.