Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Blogs

Stay informed with the latest cybersecurity insights and trending topics from SANS faculty and industry thought leaders. Explore in-depth analysis, training updates, and expert perspectives deepening your knowledge and skills.

Filter by:

Create an Action Plan for Insider Threat

Blog
  • 3 Sep 2019
Blog placeholder image

Triage Collection and Timeline Generation with KAPE

BlogDigital Forensics and Incident Response
  • 22 Aug 2019
  • Mari DeGrazia
Blog

Don't Fear DevOps: Black Hat 2019c

Blog
  • 13 Aug 2019
Blog placeholder image

It is Here: The 2019 SANS Security Awareness Report

BlogSecurity Awareness
  • 15 Jul 2019
  • Lance Spitzner
Blog placeholder image

The Risks of an IT Versus OT Paradigm

BlogIndustrial Control Systems Security
  • 9 Jul 2019
  • SANS ICS Security
Blog placeholder image

Time for Password Expiration to Die

BlogSecurity Awareness
  • 27 Jun 2019
  • Lance Spitzner
3D Glowing Text Bubble

Applying Security Awareness to the Cyber Kill Chain

BlogSecurity Awareness
  • 31 May 2019
  • Lance Spitzner
Hands Typing on Keyboard

Offline Autoruns Revisited - Auditing Malware Persistence

BlogDigital Forensics and Incident Response
  • 29 Apr 2019
  • Chad Tilbury
Blog placeholder image

A few Ghidra tips for IDA users, part 2 - strings and parameters

BlogDigital Forensics and Incident Response
  • 22 Apr 2019
  • Jim Clausing
Blog placeholder image

A few Ghidra tips for IDA users, part 1 - the decompiler/unreachable code

BlogDigital Forensics and Incident Response
  • 16 Apr 2019
  • Jim Clausing
Blog placeholder image

Ransomware Magnified in the Cloud

Blog
  • 27 Mar 2019
Blog placeholder image

Investigating WMI Attacks

BlogDigital Forensics and Incident Response
  • 9 Feb 2019
  • SANS Institute
3D Glowing Text Bubble