Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Improving Analyst Efficiency in Office365 Business Email Compromise Investigation Scenarios Through the Implementation of Open Source Tools

WhitepaperCyber Defense
  • 25 Jun 2020

Natural Language Processing for the Security Analyst

WhitepaperDigital Forensics and Incident Response
  • 24 Jun 2020

ICS Asset Identification: It's More Than Just Security

WhitepaperIndustrial Control Systems Security
  • 24 Jun 2020
  • Mark Bristow

Real-Time Honeypot Forensic Investigation on a German Organized Crime Network

WhitepaperDigital Forensics and Incident Response
  • 23 Jun 2020

Securing the Soft Underbelly of a Supercomputer with BPF Probes

WhitepaperCyber Defense
  • 18 Jun 2020

Recognizing Suspicious Network Connections with Python

Whitepaper
  • 17 Jun 2020

Answering the Unanswerable Question: How Secure Are We?

WhitepaperCybersecurity Leadership
  • 3 Jun 2020

Applying the Scientific Method to Threat Hunting

WhitepaperDigital Forensics and Incident Response
  • 28 May 2020

QUIC & The Dead: Which of the Most Common IDS/IPS Tools Can Best Identify QUIC Traffic?

WhitepaperCyber Defense
  • 20 May 2020

Quantifying Threat Actor Assessments

WhitepaperDigital Forensics and Incident Response
  • 20 May 2020

Ebb and Flow: Network Flow Logging as a Staple of Public Cloud Visibility or a Waning Imperative?

WhitepaperCloud Security
  • 18 May 2020

Efficacy of UNIX HIDS

WhitepaperDigital Forensics and Incident Response
  • 15 May 2020