Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Exploring Infostealer Malware Techniques on Automotive Head Units

WhitepaperCyber Defense, Digital Forensics and Incident Response
  • 1 Mar 2024

On The Hunt: The Retroactive and Proactive Hunt for CTI Indicators

WhitepaperDigital Forensics and Incident Response
  • 29 Feb 2024

Mode Matters: Monitoring PLCs for Detecting Potential ICS/OT Incidents

WhitepaperIndustrial Control Systems Security
  • 28 Feb 2024

Threat Hunting and False Negatives

WhitepaperCyber Defense
  • 26 Feb 2024

The Future of Network Security Technology: A SANS Survey

WhitepaperCyber Defense, Cloud Security
  • 22 Feb 2024
  • Matt Bromiley

Compromise of SHA-1 Certificate Thumbprint: A Reality in 2023?

Whitepaper
  • 14 Feb 2024

Evaluating the Efficacy of Network Forensic Tools: A Comparative Analysis of Snort, Suricata, and Zeek in Addressing Cyber Vulnerabilities

WhitepaperDigital Forensics and Incident Response
  • 14 Feb 2024

Whacking Moles: Blocklists and Their Role in the Endless Cycle of Malicious Domain Registration

WhitepaperCybersecurity and IT Essentials
  • 7 Feb 2024

Microsoft Defender and APT41

WhitepaperCyber Defense
  • 1 Feb 2024

NextGen Bugs and Bytes: Navigating Cybersecurity Risks in Genomic Analysis Pipelines

WhitepaperCyber Defense
  • 31 Jan 2024

Shining a Light on AI: Ensuring Vendor Transparency in Data Sourcing and Delivery

WhitepaperSecurity Awareness, Artificial Intelligence
  • 29 Jan 2024

Cybernetic Showdown: Safeguarding Sensitive Information from Skynet

WhitepaperCyber Defense
  • 29 Jan 2024