Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

WhitepaperDigital Forensics and Incident Response, Security Awareness
  • 7 Jan 2025

MITRE ATT&CK Labeling of Cyber Threat Intelligence via LLM

WhitepaperArtificial Intelligence
  • 7 Jan 2025

Hunting the Hound of Hades: Kerberos Delegation Attacks, Detections and Defenses

WhitepaperDigital Forensics and Incident Response
  • 23 Dec 2024

Revolutionizing Enterprise Security: The Exciting Future of Passkeys Beyond Passwords

WhitepaperCyber Defense, Security Awareness
  • 23 Dec 2024
  • Rich Greene

The Proof is in the Pudding: EDR Configuration Versus Ransomware

WhitepaperCyber Defense
  • 23 Dec 2024

The Open-Source Trap: Unraveling Open-Source Threats in the Software Supply Chain

WhitepaperSecurity Awareness
  • 5 Dec 2024

The Cost of Container Runtime Security

WhitepaperCloud Security
  • 5 Dec 2024

Security, Cost, and Compliance in the Cloud for Medical Nonprofits

WhitepaperCybersecurity and IT Essentials
  • 5 Dec 2024

Leveraging Generative Artificial Intelligence for Memory Analysis

WhitepaperArtificial Intelligence
  • 5 Dec 2024

Never Trust, Always Verify: Effectiveness of Endpoint Detection and Response Tools Versus Zero Trust Endpoint Controls in Enterprise Environments

WhitepaperCyber Defense
  • 5 Dec 2024

Using PowerShell and Other Command Line Tools for Windows 11 STIG Compliance

WhitepaperCyber Defense
  • 5 Dec 2024

Revolutionizing Cybersecurity: Implementing Large Language Models as Dynamic SOAR Tools

WhitepaperArtificial Intelligence
  • 5 Dec 2024