Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML

WhitepaperCyber Defense
  • 30 May 2003

Conducting an electronic information risk assessment for Gramm-Leach-Bliley Act compliance.

WhitepaperCybersecurity Leadership
  • 30 May 2003

DNS, DNSSEC and the Future

Whitepaper
  • 30 May 2003

Network Based VPNs

WhitepaperCyber Defense
  • 23 May 2003

The Logbook of The World

WhitepaperCyber Defense
  • 23 May 2003
  • Ted Demopoulos

A Tour of TOCTTOUs

WhitepaperCybersecurity and IT Essentials
  • 23 May 2003

Security considerations with Squid proxy server

Whitepaper
  • 23 May 2003

Mixing Technology and Business: The Roles and Responsibilities of the Chief Information Security Officer

Whitepaper
  • 23 May 2003

Application Of The Nsa Infosec Assessment Methodology

WhitepaperCybersecurity Leadership
  • 23 May 2003

Is The Border Gateway Protocol Safe?

Whitepaper
  • 23 May 2003

Implementing Secure Access to Cisco Devices using TACACS+ and SSH

Whitepaper
  • 20 May 2003

Intrusion Detection Is Dead. Long Live Intrusion Prevention!

WhitepaperDigital Forensics and Incident Response
  • 12 May 2003