Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Adopting Real-Time Threat Detection Workflows
![](https://panther.com/wp-content/uploads/2022/09/Blog_RealTime_22-700x467.jpg)
Podcast
Thomas Owen of Grafana on Why Enabled Autonomy is the Future of Modern Security Teams
![](https://panther.com/wp-content/uploads/2022/09/DetScale_Grafana_Web-700x435.jpg)
Blog
Five Lessons From Detection & Response Leaders
![](https://panther.com/wp-content/uploads/2022/09/FiveLessons_Blog-700x467.jpg)
Blog
The Benefits of Using Python to Write SIEM Detections
![](https://panther.com/wp-content/uploads/2022/09/Blog_PythonTCO_22-2-700x467.jpg)
Podcast
Mike Saxton of Booz Allen on Where Teams Start in Their Detection Journey and How Detection as Code is Bridging the Cybersecurity Skills Gap
![](https://panther.com/wp-content/uploads/2022/09/DetScale_BoozAllen_Web-700x435.jpg)
Blog
Join Panther’s Founder and CEO Jack Naglieri for a Community AMA!
![](https://panther.com/wp-content/uploads/2022/09/Panther_CommunityAMA_Jack_Sept22_Blog-2-700x438.jpg)
Webinar
How to Implement Effective Security Monitoring for AWS
![](https://panther.com/wp-content/uploads/2022/09/1440x900_Panther_forAWS_Web-700x438.jpg)
Podcast
Compass CISO JJ Agha on Relentless Iterations and What He Expects from a Modern SIEM
![](https://panther.com/wp-content/uploads/2022/08/DetScale_Compass_Web-700x435.jpg)