Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Threat Hunting in AWS
![](https://panther.com/wp-content/uploads/2022/12/Blog_Threat-Hunting-in-AWS_22-700x468.jpg)
Webinar
How Dropbox uses Detection-as-Code for AWS Threats
![](https://panther.com/wp-content/uploads/2022/12/Dropbox-Webinar-Web-Thumbnail@2x-700x438.jpg)
Case Study
FloQast Accelerates Detection Testing and Deployment with Panther
![](https://panther.com/wp-content/uploads/2022/11/Case-Study-FloQast-2-700x395.jpg)
e-Book
Crafting Security Detections for AWS
![](https://panther.com/wp-content/uploads/2022/11/Crafting-Security-Detections-for-AWS-Ebook-700x394.jpg)
Blog
Optimize CloudTrail Ingestion with Modern SIEM
![](https://panther.com/wp-content/uploads/2022/11/Blog_Optimize-CloudTrail_22-700x468.jpg)
Blog
5 Things You Need to Know About the State of SIEM in 2022
![](https://panther.com/wp-content/uploads/2022/11/Blog_State-of-SIEM-5-Things_22-blue-700x468.jpg)
Blog
State of SIEM 2022: 5 Key Takeaways
![](https://panther.com/wp-content/uploads/2022/11/Blog_State-of-SIEM_22-teal-700x467.jpg)
Blog
Get Started: AWS and Panther
![](https://panther.com/wp-content/uploads/2022/11/Blog_PantherAWS_Overview2-700x467.jpg)