Resource Hub
Featured Resources
Detection-as-Code
All Resources
Blog
Unraveling SIEM Correlation Techniques
Blog
CVE-2024-3094 – Linux Supply Chain Compromise Affecting XZ Utils Data Compression Library
Blog
Critical Steps To Detect and Prevent Cryptojacking In Your Cloud Infrastructure
Blog
How North Korean Cybercrime Aids the Russian Military and Circumvents Sanctions
Webinar
How Zapier Uses Detection-as-Code to Increase Their Alert Fidelity
Blog
Mitigating the Midnight Blizzard Threat
Blog
The Scattered Spider Attack: Safeguarding Your Okta Infrastructure
Blog
Mastering Alert Fatigue: Best Practices for Centralized Management