Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
How to Turn Security Pipelines Into Gold Mines
![](https://panther.com/wp-content/uploads/2024/06/Gold-Mine-700x394.jpg)
Podcast
Check Point’s Daniel Wiley on Balancing Technology and Human Analytics in Cybersecurity
![](https://panther.com/wp-content/uploads/2024/06/DaS_Podcast-WebThumbnail__DanielWiley-700x394.jpg)
Blog
Make Your SecOps Pipe Dreams a Reality
![](https://panther.com/wp-content/uploads/2024/06/Data-Pipeline-Part-1-700x394.jpg)
Blog
DaC-Driven CI/CD: Mastering GitHub Actions and Workflows
![](https://panther.com/wp-content/uploads/2024/05/GitHub-Actions-1-700x394.jpg)
Podcast
Inductive Automation’s Jason Waits on Building Scalable Security Programs Through Automation
![](https://panther.com/wp-content/uploads/2024/05/DaS_Podcast-WebThumbnail__JasonWaits-700x394.jpg)
Podcast
Panther’s Jack Naglieri on Navigating the New Role of Detection Engineering in Cybersecurity (Special Episode)
![](https://panther.com/wp-content/uploads/2024/05/DaS-Podcast_1920x1080px_Thumbnails__HotOnes-700x394.jpg)
Blog
Why You Should Be Ingesting AWS VPC Flow Logs
![](https://panther.com/wp-content/uploads/2024/05/VPC-Flow-700x394.jpg)
Podcast
The Duckbill Group’s Corey Quinn on What Billing Data Can Tell Us About AWS Security
![](https://panther.com/wp-content/uploads/2024/05/DaS_Podcast-WebThumbnail__CoreyQuinn-700x394.jpg)