Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Tracing the Tracer: Analysis of a Mobile Contact Tracing Application

WhitepaperCyber Defense
  • 4 Jan 2021

Practical Process Analysis - Automating Process Log Analysis with PowerShell

WhitepaperDigital Forensics and Incident Response
  • 29 Dec 2020

Ubuntu Artifacts Generated by the Gnome Desktop Environment

WhitepaperDigital Forensics and Incident Response
  • 16 Dec 2020

Detecting System Log Loss Through One-Way Communication Channels

WhitepaperCyber Defense
  • 16 Dec 2020

Automating Google Workspace Incident Response

WhitepaperDigital Forensics and Incident Response
  • 16 Dec 2020

Detecting and Preventing the Top AWS Database Security Risks

WhitepaperCloud Security
  • 9 Dec 2020

Is it Ever Really Gone? The Impact of Private Browsing and Anti-Forensic Tools

WhitepaperDigital Forensics and Incident Response
  • 9 Dec 2020

Mitigating Attacks on a Supercomputer with KRSI

WhitepaperCyber Defense
  • 9 Dec 2020

Continuous Monitoring Effectiveness Against Detecting Insider Threat

WhitepaperDigital Forensics and Incident Response
  • 19 Nov 2020

Reverse Engineering Virtual Machine File System 6 (VMFS 6)

WhitepaperDigital Forensics and Incident Response
  • 19 Nov 2020

Learning from Learning: Detecting Account Takeovers by Identifying Forgetful Users

WhitepaperDigital Forensics and Incident Response
  • 11 Nov 2020

Defeat the Dread of Adopting DMARC: Protect Domains from Unauthorized Email

WhitepaperCybersecurity and IT Essentials
  • 11 Nov 2020