Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
A Technical Primer in Detection Engineering
![](https://panther.com/wp-content/uploads/2022/06/CyberExplained-detection-engineering.png)
Blog
What is Next-Gen SIEM?
![](https://panther.com/wp-content/uploads/2022/06/CyberExplained-Next-Gen-SIEM.png)
Blog
Avoiding Alert Storms with Data Replay in Panther
![](https://panther.com/wp-content/uploads/2022/05/Resource_Blog_AutomateSecurity_22-700x700.jpg)
Blog
Reflecting on what makes Panther a “Great Place to Work”
![](https://panther.com/wp-content/uploads/2022/05/1652806444364-700x368.jpeg)
Blog
An overview on XDR platforms
![](https://panther.com/wp-content/uploads/2022/05/CyberExplained-XDR-Plaform-Guide.png)
Webinar
How to Detect and Investigate Threats with Panther
![](https://panther.com/wp-content/uploads/2022/05/1200x627_ThreatDet_SM-700x366.jpg)
Blog
SIEM vs. Log Management: An Overview
![](https://panther.com/wp-content/uploads/2021/12/SIEM-vs-Log-Management.png)
Blog
Endpoint Security Monitoring: A Complete Overview
![](https://panther.com/wp-content/uploads/2022/04/CyberExplained-Web-Opt-1.png)