Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Onion-Zeek-RITA: Improving Network Visibility and Detecting C2 Activity

WhitepaperDigital Forensics and Incident Response
  • 4 Jan 2019

Gaining Visibility on the Network with Security Onion: A Cyber Threat Intelligence Based Approach

WhitepaperDigital Forensics and Incident Response
  • 2 Jan 2019

Don't Knock Bro

WhitepaperDigital Forensics and Incident Response
  • 12 Dec 2018

A Practical Model for Conducting Cyber Threat Hunting

WhitepaperDigital Forensics and Incident Response
  • 29 Nov 2018

SDN Southbound Threats

WhitepaperCyber Defense
  • 20 Nov 2018

A Swipe and a Tap: Does Marketing Easier 2FA Increase Adoption?

WhitepaperSecurity Awareness
  • 19 Nov 2018

Secure Internet Gateways: Backing Down from a Fight

WhitepaperCloud Security
  • 2 Nov 2018

Microsoft DNS Logs Parsing and Analysis: Establishing a Standard Toolset and Methodology for Incident Responders

WhitepaperCyber Defense
  • 2 Nov 2018

Hardening OpenShift Containers to complement Incident Handling

WhitepaperDigital Forensics and Incident Response
  • 2 Nov 2018

Advancing SIEM Log Management Strategies through Vendor-Agnostic Measurement

WhitepaperCyber Defense
  • 2 Nov 2018

To Block or not to Block? Impact and Analysis of Actively Blocking Shodan Scans

WhitepaperDigital Forensics and Incident Response
  • 22 Oct 2018

Tearing up Smart Contract Botnets

WhitepaperOffensive Operations
  • 22 Oct 2018