How to Implement Snowflake Security Best Practices with Panther
Learn how to secure your Snowflake with pre-built rules and detections based on Snowflakes’s own security best practices guide.
AWS CloudTrail Logs: A Security Monitoring Overview
Panther can collect, normalize, and analyze your AWS CloudTrail logs to detect suspicious activity in real-time.
Rumble’s Chris Kirsch: How Asset Discovery Can Help with Detection and Response
Chris Kirsch, CEO and co-founder of Rumble, discusses why covering the basics, like having a full inventory of your network with all the managed and unmanaged devices, is a best practice to secure any environment.
Cisco Secure’s J. Wolfgang Goerlich: Rebuilding Trust in Security Tools
J Wolfgang Goerlich, Advisory CISO at Cisco Secure, discusses how trust is a determinant factor in building the security tools of the future, why so many CISOs lost trust over SIEMs and what we can do to rebuild it.
Threat Detection and Response: An Overview
Learn about threat detection at a high level, including the main tools and frameworks that support a strong threat detection program.
Panther’s guide to Log4j exploitation prevention and detection
We're sharing the latest learnings for the Log4j exploitation in late 2022 and ways to detect Log4j vulnerabilities.
Netflix’s Srinath Kuruvadi: Securing The Cloud Footprint With an Adaptive, Agile, and People Leadership Approach
Srinath Kuruvadi, head of cloud infrastructure security at Netflix, shares how his leadership skills have evolved over time, where he puts his focus when approaching infrastructure security, and what he believes are the key ingredients any security team should have today.
Life As A Security Engineer
Panther surveyed over 400 security engineers to better understand why they chose their profession, what they do on a daily basis, what challenges they face, and a host of other aspects of their work lives.