Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Blogs

Stay informed with the latest cybersecurity insights and trending topics from SANS faculty and industry thought leaders. Explore in-depth analysis, training updates, and expert perspectives deepening your knowledge and skills.

Filter by:

Building a Generative AI-Powered Cybersecurity Workforce

BlogArtificial Intelligence
  • 10 May 2024
  • SANS Institute
Blog placeholder image

The Distinctive Worlds of OT Cybersecurity and IT Cybersecurity

BlogIndustrial Control Systems Security
  • 7 May 2024
  • SANS ICS Security
Blog placeholder image

Building a Cloud Security Flywheel: Lessons from the Field

BlogCloud Security
  • 5 May 2024
  • Shaun McCullough
Blog placeholder image

How AI Forensics Is Transforming Mobile Device Investigations

BlogArtificial Intelligence
  • 3 May 2024
  • Domenica Lee Crognale
Blog placeholder image

Unveiling the 2024 SANS | GIAC Cyber Workforce Research Report: Building and Sustaining Mid-Level Cybersecurity Roles

BlogCybersecurity Leadership
  • 2 May 2024
  • GIAC Certifications
Blog placeholder image

Deploying Multi Factor Authentication – The What, How, and Why

BlogSecurity Awareness
  • 30 Apr 2024
  • Lance Spitzner
Blog placeholder image

Insane Incident Incursion Recursion: Mastering Incident Response Reporting Regulations

BlogIndustrial Control Systems Security
  • 29 Apr 2024
  • Jason Christopher
Blog placeholder image

Spring 2024 Update: Explore the Latest Enhancements to SANS FOR585: Smartphone Forensic Analysis In-Depth

BlogDigital Forensics and Incident Response
  • 26 Apr 2024
  • Heather Barnhart
Blog placeholder image

The Ripple Effect: NIS2's Impact on Cybersecurity Practices Across the EU

Blog
  • 23 Apr 2024
  • Bojan Zdrnja
Blog placeholder image

Following the Trail of Threat Actors in Google Workspace Audit Logs

BlogDigital Forensics and Incident Response
  • 19 Apr 2024
  • Megan Roddie-Fonseca
Blog placeholder image

Cybersecurity Tabletop Exercise vs. Simulations: Which Strengthens Your Defense?

BlogCybersecurity Leadership
  • 17 Apr 2024
  • Chris Wilkes
Blog placeholder image

Beyond Compliance: Leveraging NIS2 for Enhanced Cyber Resilience and Leadership Accountability

Blog
  • 15 Apr 2024
  • James Tarala
Blog placeholder image