Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
From Logs to Detection: Using Snowflake and Panther to Detect K8s Threats
![](https://panther.com/wp-content/uploads/2024/02/venti-views-1cqIcrWFQBI-unsplash-scaled-1-700x466.jpg)
Podcast
Google Cloud’s Anton Chuvakin on Decoupled SIEMs and the Future of Data Platforms and Security
![](https://panther.com/wp-content/uploads/2024/02/Anton-Chuvakin-Web-Thumbnail@2x-700x394.jpg)
Blog
Shifting from Reactive to Proactive Cybersecurity Postures
![](https://panther.com/wp-content/uploads/2024/02/secirityposture-700x394.jpg)
Podcast
Deloitte’s Dhruv Majumdar on How to Mature Your Detection and Response
![](https://panther.com/wp-content/uploads/2024/02/Dhruv-Majumdar-Web-Thumbnail@2x-700x394.jpg)
Blog
Silver Surfers: Guarding Seniors in the Digital Wave of Cybersecurity
![](https://panther.com/wp-content/uploads/2023/11/artyom-kabajev-_aduPjJvDx4-unsplash-scaled-700x467.jpg)
Blog
Collaborate with Confidence: Monitor Notion Audit Logs with Panther
![](https://panther.com/wp-content/uploads/2023/10/Blog_Notion_Integration@2x-scaled-700x467.jpg)
Blog
User Experience, the Unseen Hero in Security Products
![](https://panther.com/wp-content/uploads/2023/10/Blog_User-Experience-Unseen-Hero_23@2x-700x467.jpg)
Blog
The Great Cloud-Native Fib: Unmasking a Core SIEM Deception
![](https://panther.com/wp-content/uploads/2023/09/Decoding-SIEM-Deceptions-Ebook-Thumbnail-3-700x394.jpg)