Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Nation-State Actors Targeting Software Supply Chain via GitHub
![](https://panther.com/wp-content/uploads/2023/08/Blog_Nation-State-Actors-Targeting-Software-Supply-Chain_23-700x468.jpg)
Blog
Hey Microsoft, Security Logs Want to be Free!
![](https://panther.com/wp-content/uploads/2023/07/Blog_Security-Logs-Want-to-be-Free_23@2x-700x467.jpg)
Blog
Using AWS Secrets Manager with Panther Detections
![](https://panther.com/wp-content/uploads/2023/07/Blog_Using-AWS-Secrets-Manager-with-Panther-Detections_23-scaled-700x467.jpg)
Blog
The Power of Detection-as-Code, For Everyone
![](https://panther.com/wp-content/uploads/2023/06/Blog_PantherSimpleDectections_23-700x467.jpg)
Blog
How Workrise Implemented Panther To Achieve Full Visibility
![](https://panther.com/wp-content/uploads/2023/05/Blog_Workrise-Webinar_23-scaled-700x467.jpg)
Blog
Panther Recognized as Fortune Best Places to Work in the Bay Area
![](https://panther.com/wp-content/uploads/2023/06/Blog_BPTW_BayArea_23-2-700x467.jpg)
Blog
Realize SIEM Value from Day One
![](https://panther.com/wp-content/uploads/2023/06/Blog_PantherDayOneValue_23-700x467.jpg)
Blog
How Panther Helps With SOC 2
![](https://panther.com/wp-content/uploads/2023/05/Blog_How-Panther-Helps-With-SOC2_23@2x-700x467.jpg)