
What Application and Product Security (Really) Is with Ty Sbano
Ty Sbano discusses how to build robust security teams and the relationship between application security and an incident response function.

Operational Readiness and EDR with Brad LaPorte
Brad LaPorte discusses the evolution of Endpoint Detection and Response in-depth and challenges with deploying EDR in a large organization.

Find Patterns Quickly with Indicator Search Drill Down
Investigate alerts more easily with the ability to drill down into finer-grained time increments within visualizations of aggregated data.

Future of Cyber Attacks
A new content series that will interview cyber security experts and share their insights to help organizations prepare themselves for what lies ahead.

Panther + AWS
Detect AWS misconfigurations and suspicious activity in real-time with detection-as-code and normalized logs in a security data lake.

Reducing Cost By Moving To A Cloud-Native SIEM
Leveraging cloud services, detection-as-code, and security data lakes to improve security posture and reduce the operational burden of SIEM.

Detect Everything, Real-Time Alerts As Needed
Learn how to detect suspicious activity and generate real-time alerts to trigger high-severity alerts when activity passes a threshold.