Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Risk Management with Automated Feature Analysis of Software Components

WhitepaperCybersecurity Leadership
  • 27 Aug 2020

You've Had the Power All Along: Process Forensics With Native Tools

WhitepaperDigital Forensics and Incident Response
  • 27 Aug 2020

Detection of Malicious Documents Utilizing XMP Identifiers

WhitepaperDigital Forensics and Incident Response
  • 27 Aug 2020

Incident Response in a Security Operation Center

WhitepaperDigital Forensics and Incident Response
  • 27 Aug 2020

All for One, One for All: Bringing Data Together with Devo

WhitepaperDigital Forensics and Incident Response
  • 19 Aug 2020

Chaining Vulnerability Scans inTenable IO Using Python

Whitepaper
  • 10 Aug 2020

60870-5-104 protocol snort rule customization

WhitepaperIndustrial Control Systems Security
  • 10 Aug 2020

Benefits and Adoption Rate of TLS 1.3

Whitepaper
  • 28 Jul 2020

ATT&CK-Based Live Response for GCP CentOS Instances

WhitepaperCloud Security
  • 22 Jul 2020

Examining Sysmon's Effectiveness as an EDR Solution

WhitepaperDigital Forensics and Incident Response
  • 17 Jul 2020

Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework

WhitepaperCybersecurity and IT Essentials
  • 17 Jul 2020
  • John Hubbard

Methods to Employ Zeek in Detecting MITRE ATT&CK Techniques

WhitepaperCyber Defense
  • 15 Jul 2020