Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Architecture and Configuration for Hardened SSH Keys

WhitepaperCyber Defense
  • 11 Nov 2020

Leveraging the OWASP API Security top 10 to build secure web services

Whitepaper
  • 11 Nov 2020

Verifying Universal Windows Platform (UWP) Signatures at Scale

WhitepaperDigital Forensics and Incident Response
  • 28 Oct 2020

Fear of the Unknown: A Meta-Analysis of Insecure Object Deserialization Vulnerabilities

Whitepaper
  • 28 Oct 2020

Open-Source Endpoint Detection and Response with CIS Benchmarks, Osquery, Elastic Stack, and TheHive

WhitepaperDigital Forensics and Incident Response
  • 23 Oct 2020

Prescriptive Model for Software Supply Chain Assurance in Private Cloud Environments

WhitepaperCloud Security
  • 14 Oct 2020

The All-Seeing Eye of Sauron: A PowerShell tool for data collection and threat hunting

WhitepaperDigital Forensics and Incident Response
  • 14 Oct 2020

Enhancing the security capabilities of the Ubiquiti UniFi Security Gateway (USG)

Whitepaper
  • 8 Oct 2020

Firebase: Google Cloud's Evil Twin

WhitepaperCloud Security
  • 8 Oct 2020
  • Brandon Evans

A Startups Guide to Implementing a Security Program

WhitepaperCybersecurity Leadership
  • 8 Oct 2020

Shall We Play a Game?: Analyzing the Security of Cloud Gaming Services

WhitepaperCloud Security
  • 7 Oct 2020

No Strings on Me: Linux and Ransomware

WhitepaperCyber Defense
  • 7 Oct 2020