Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Invaders of the internet connected home

Whitepaper
  • 1 Oct 2020

The Poisoned Postman: Detecting Manipulation of Compliance Features in a Microsoft Exchange Online Environment

WhitepaperCloud Security
  • 30 Sep 2020

Mitigating Risk with the CSA 12 Critical Risks for Serverless Applications

WhitepaperCloud Security
  • 30 Sep 2020

Fight or Flight: Moving Small and Medium Businesses into the Cloud During a Major Incident

WhitepaperDigital Forensics and Incident Response
  • 30 Sep 2020

Remote Penetration Testing with Ninja Pi

Whitepaper
  • 28 Sep 2020

Compliance Benchmarks using Cloud Custodian

WhitepaperCloud Security
  • 25 Sep 2020

Security Network Auditing: Can Zero-Trust Be Achieved?

WhitepaperCybersecurity Leadership
  • 23 Sep 2020

Zeek Log Reconnaissance with Network Graphs Using Maltego Casefile

WhitepaperDigital Forensics and Incident Response
  • 21 Sep 2020

Industrial Traffic Collection: Understanding the implications of Deploying visibility without impacting production

WhitepaperIndustrial Control Systems Security
  • 21 Sep 2020

Replacing WINS in an Open Environment with Policy Managed DNS Servers

WhitepaperCyber Defense
  • 21 Sep 2020

Fashion Industry (Securely) 4.0ward

WhitepaperIndustrial Control Systems Security
  • 9 Sep 2020

Detecting Malicious Activity in Large Enterprises

WhitepaperSecurity Awareness
  • 8 Sep 2020
  • Matt Bromiley