Protect Business Critical Applications with GitHub Audit Logs & Modern SIEM
Security teams' usage of GitHub audit logs has become critical to monitoring the safe-keeping of infrastructure-critical code repositories.
Think Like a Detection Engineer, Pt. 2: Rule Writing
In this post, we're overviewing how Detection Engineers should think about writing rules that are effective, tested, and actionable.
Monitoring GCP Audit Logs
With Google Cloud audit logs, your security team gains extensive insight into what's happening within your cloud projects.
Think Like a Detection Engineer, Pt. 1: Logging
Getting started as a Detection Engineer involves mapping and classifying systems by importance and creating detections that flag varying degrees of behaviors by risk level.
Connect with Panther Users and Security Experts in the Panther Community
The Panther Community is a place where you can share knowledge like detection code, indicators of compromise, and other threat intel, and discuss Panther best-practices as well as connect with security experts.
Rapyd’s Nir Rothenberg on Lessons Learned Transitioning from On-Prem to Cloud
Hear about lessons learned in transitioning from an on-prem environment to cloud infrastructure, building a modern team, scaling at Rapyd, and tips to help organizations build a modern security team that’s capable of detection and response at scale.
Monitoring 1Password Logs
Panther and 1Password have partnered together to help businesses detect unusual activities associated with their user accounts and respond to them in a timely manner.
A Primer on MITRE ATT&CK as an Incident Response Framework
This article details how security teams can leverage the MITRE ATT&CK framework in Panther to bolster incident response.