Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Panther Now Integrates with Amazon Security Lake: Embracing the Open Cybersecurity Schema Framework (OCSF)
![](https://panther.com/wp-content/uploads/2024/04/Panther-AWS-Blog-Thumbnail-700x394.jpg)
Case Study
Zapier Transforms Their Security Team From Manual Triage to Proactive Detection
![](https://panther.com/wp-content/uploads/2024/04/Case-Study-Zapier-700x395.jpg)
Blog
Learn it Firsthand: How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity
![](https://panther.com/wp-content/uploads/2024/04/zapier-2-700x394.jpg)
Podcast
Josh Liburdi on Brex’s Innovative Approach to Data Quality in SecOps
![](https://panther.com/wp-content/uploads/2024/04/DaS_Podcast-WebThumbnail__JoshLiburdi-700x394.jpg)
Blog
Why You Should Be Ingesting AWS CloudTrail Logs
![](https://panther.com/wp-content/uploads/2024/04/CloudTrail-Logs-700x394.jpg)
Case Study
Benchling’s Code Driven Security Operations Program is Enabled by Panther
![](https://panther.com/wp-content/uploads/2024/04/Case-Study-Benchling-700x395.jpg)
Blog
What You Need to Know About the Latest GitLab Vulnerability (Including Detection)
![](https://panther.com/wp-content/uploads/2024/04/What-You-Need-to-Know-about-the-latest-Gitlab-Vulnerability-700x394.jpg)
Podcast
SAP’s Matthew Valites on Why He Is a Proponent of Detection-as-Code
![](https://panther.com/wp-content/uploads/2024/04/DaS_Podcast-WebThumbnail__MatthewValites-700x394.jpg)