Resource Hub
Featured Resources
Detection-as-Code
All Resources
Webinar
The Need for Speed: Modern SIEM with Real-Time Detection & Automation
![](https://panther.com/wp-content/uploads/2023/09/Need-for-Speed-Webinar-700x394.jpg)
Blog
Shifting SIEM Left: Securing the Software Supply Chain with GitHub Monitoring
![](https://panther.com/wp-content/uploads/2023/09/Blog_SIEM-for-Github_23@2x-700x467.jpg)
Blog
A Quick and Easy Guide to Detection and Query Tuning
![](https://panther.com/wp-content/uploads/2023/09/Blog_Quick-Easy-Guide-to-Detection-and-Query-Tuning_23@2x-700x467.jpg)
e-Book
Decoding SIEM Deceptions
![](https://panther.com/wp-content/uploads/2023/09/Decoding-SIEM-Deceptions-Ebook-Thumbnail-3-700x394.jpg)
Blog
Panther Users Can Now Manage S3 Log Sources with Terraform
![](https://panther.com/wp-content/uploads/2023/08/Blog_HashiCorp-Terraform_Integration-700x467.jpg)
Blog
Monitoring Tailscale Network & Audit Logs with Panther
![](https://panther.com/wp-content/uploads/2023/07/Blog_Tailscale_Integration-700x467.jpg)
Blog
How FloQast Transforms Security Ops with Detection-as-Code
![](https://panther.com/wp-content/uploads/2023/08/FloQast_Header-700x467.png)
Blog
Accelerating Investigation with Panther
![](https://panther.com/wp-content/uploads/2023/08/Blog_How-Panther-Ensures-Resilience-During-Cloud-Outages_23@2x-700x467.jpg)