Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
How Detection-as-Code Revolutionizes Security Posture
![](https://panther.com/wp-content/uploads/2023/12/How-DaC-Revolutionizes-Security-Posture-Blog-1-700x394.jpg)
Blog
Panther Announces Splunk Alert Destination Integration
![](https://panther.com/wp-content/uploads/2023/12/Panther-Announces-Splunk-Alert-Destination-Integration-Blog-1-700x394.jpg)
Blog
Introducing Panther’s Security Data Lake Search
![](https://panther.com/wp-content/uploads/2023/12/Introducing-Panthers-Security-Data-Lake-Search-Blog-700x394.jpg)
Blog
From Logs to Detection: Using Snowflake and Panther to Detect K8s Threats
![](https://panther.com/wp-content/uploads/2024/02/venti-views-1cqIcrWFQBI-unsplash-scaled-1-700x466.jpg)
Blog
Shifting from Reactive to Proactive Cybersecurity Postures
![](https://panther.com/wp-content/uploads/2024/02/secirityposture-700x394.jpg)
Blog
Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity
![](https://panther.com/wp-content/uploads/2023/11/artyom-kabajev-_aduPjJvDx4-unsplash-scaled-700x467.jpg)
Blog
Collaborate with Confidence: Monitor Notion Audit Logs with Panther
![](https://panther.com/wp-content/uploads/2023/10/Blog_Notion_Integration@2x-scaled-700x467.jpg)
Blog
User Experience, the Unseen Hero in Security Products
![](https://panther.com/wp-content/uploads/2023/10/Blog_User-Experience-Unseen-Hero_23@2x-700x467.jpg)