How Panther Ensures Resilience During Cloud Outages
Discover how Panther's architecture and engineering principles ensure the safety of customer data even when faced with a major outage.
Nation-State Actors Targeting Software Supply Chain via GitHub
GitHub warns of Lazarus Group's social engineering attack on developers. Learn how the attack operates and how to protect your organization.
Hey Microsoft, Security Logs Want to be Free!
Learn how Microsoft's recent change in licensing structure will allow more organizations to secure their Azure environments.
How to Integrate Attack Surface Management with Real-Time Detections
Learn to enrich modern SIEM real-time detections with asset inventory at Cloud scale
Panther Solution Overview
Learn how the Panther SIEM platform works from data collection through response.
Using AWS Secrets Manager with Panther Detections
Discover how to securely access third-party APIs from Panther's Python detection engine by leveraging AWS Secrets Manager.
Google’s Anton Chuvakin and Timothy Peacock on How to Take Your D&R Efforts from 0 to 1 — or 5, or 100
Anton Chuvakin, Security Advisor at the Office of the CISO at Google Cloud, and Timothy Peacock, Senior Product Manager at Google, discuss how to build your D&R from scratch, knowing if you need to go from zero to one, five, or a hundred, and what role AI plays in security today.