Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Phishing and Pharming - The Evil Twins

Whitepaper
  • 14 Feb 2007

Server Security in a Citrix Presentation/Terminal Server Environment

WhitepaperCybersecurity Leadership
  • 14 Feb 2007

VPNScan: Extending the Audit and Compliance Perimeter

WhitepaperCybersecurity Leadership
  • 12 Feb 2007

Pros and Cons of using Linux and Windows Live CDs in Incident Handling and Forensics

WhitepaperDigital Forensics and Incident Response
  • 9 Feb 2007

Security Issues and Countermeasure for VoIP

Whitepaper
  • 7 Feb 2007

Visual Baselines - Maximizing Economies of Scale Using Round Robin Databases

WhitepaperCyber Defense
  • 11 Jan 2007

Social Engineering Your Employees to Information Security

WhitepaperSecurity Awareness
  • 19 Dec 2006

Wireless Attacks from an Intrusion Detection Perspective

WhitepaperCyber Defense
  • 11 Dec 2006

Secure Configuration of Apache in the Mac OS X Environment

Whitepaper
  • 7 Dec 2006

Discovering Rogue Wireless Access Points Using Kismet and Disposable Hardware

WhitepaperCyber Defense
  • 7 Dec 2006
  • Larry Pesce

The December Storm of WMF: Preparation, Identification, and Containment of Exploits

WhitepaperDigital Forensics and Incident Response
  • 17 Nov 2006

Aligning an information risk management approach to BS 7799-3:2005

WhitepaperCybersecurity Leadership
  • 13 Nov 2006