Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Testing Web Application Security Scanners against a Web 2.0 Vulnerable Web Application

Whitepaper
  • 11 Oct 2018

Generating Anomalies Improves Return on Investment: A Case Study for Implementing Honeytokens

WhitepaperCyber Defense
  • 11 Oct 2018

All-Seeing Eye or Blind Man? Understanding the Linux Kernel Auditing System

WhitepaperCyber Defense
  • 21 Sep 2018

Practical implementation of the Australian Signals Directorate Essential Eight Maturity Model to Level Three within residential University colleges.

WhitepaperCybersecurity and IT Essentials
  • 21 Aug 2018

Processing experimental protocols against IDS

WhitepaperCyber Defense
  • 10 Aug 2018

Which YARA Rules Rule: Basic or Advanced?

Whitepaper
  • 10 Aug 2018

Evidence of Data Exfiltration via Containerised Applications on Virtual Private Servers

WhitepaperDigital Forensics and Incident Response
  • 6 Aug 2018

PiOT - a small form factor defense for indefensible devices

Whitepaper
  • 2 Aug 2018

The Definition of SOC-cess? SANS 2018 Security Operations Center Survey

Whitepaper
  • 1 Aug 2018
  • Christopher Crowley, John Pescatore

Security Considerations for Team Based Password Managers

WhitepaperCybersecurity Leadership
  • 23 Jul 2018

AI Hunting with the Cybereason Platform: A SANS Review

WhitepaperDigital Forensics and Incident Response, Artificial Intelligence
  • 23 Jul 2018
  • Dave Shackleford

Hunting with Rigor: Quantifying the Breadth, Depth and Threat Intelligence Coverage of a Threat Hunt in Industrial Control System Environments

WhitepaperDigital Forensics and Incident Response
  • 23 Jul 2018