Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
How Panther Ensures Resilience During Cloud Outages
![](https://panther.com/wp-content/uploads/2023/07/Blog_How-Panther-Ensures-Resilience-During-Cloud-Outages_23-700x467.jpg)
Webinar
How to Detect Threats in <1 Hour
![](https://panther.com/wp-content/uploads/2023/08/Detect-Threats-in-less-than-1hr-Webinar-2-700x394.jpg)
Blog
Nation-State Actors Targeting Software Supply Chain via GitHub
![](https://panther.com/wp-content/uploads/2023/08/Blog_Nation-State-Actors-Targeting-Software-Supply-Chain_23-700x468.jpg)
Blog
Hey Microsoft, Security Logs Want to be Free!
![](https://panther.com/wp-content/uploads/2023/07/Blog_Security-Logs-Want-to-be-Free_23@2x-700x467.jpg)
Brief
Evaluating a SIEM
![](https://panther.com/wp-content/uploads/2024/02/Evaluating-a-SIEM-SB-Thumbnail-700x394.jpg)
Webinar
How to Integrate Attack Surface Management with Real-Time Detections
![](https://panther.com/wp-content/uploads/2023/07/Integrate-Attack-Surface-Management-with-Real-Time-Detections-Webinar-3-700x394.jpg)
Brief
Panther Solution Overview
![](https://panther.com/wp-content/uploads/2023/07/Panther-Overview-SB-Thumbnail-3-700x394.jpg)
Blog
Using AWS Secrets Manager with Panther Detections
![](https://panther.com/wp-content/uploads/2023/07/Blog_Using-AWS-Secrets-Manager-with-Panther-Detections_23-scaled-700x467.jpg)