Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

When a picture is worth a thousand products: Image protection in a digital age

Whitepaper
  • 12 Sep 2017

HL7 Data Interfaces in Medical Environments: Attacking and Defending the Achille's Heel of Healthcare

Whitepaper
  • 12 Sep 2017

Security Tools for the SMB and SME Segments

WhitepaperCyber Defense
  • 11 Sep 2017

A Technical Approach at Securing SaaS using Cloud Access Security Brokers

WhitepaperCloud Security
  • 6 Sep 2017

Triaging Alerts with Threat Indicators

WhitepaperDigital Forensics and Incident Response
  • 25 Aug 2017

Cracking Active Directory Passwords or 'How to Cook AD Crack'

Whitepaper
  • 23 Aug 2017

The Conductor Role in Security Automation and Orchestration

WhitepaperDigital Forensics and Incident Response
  • 22 Aug 2017

Artificial Intelligence and Law Enforcement

WhitepaperDigital Forensics and Incident Response
  • 21 Aug 2017

A Practical Example of Incident Response to a Network Based Attack

WhitepaperDigital Forensics and Incident Response
  • 16 Aug 2017

Basic NGIPS Operation and Management for Intrusion Analysts

WhitepaperCyber Defense
  • 15 Aug 2017

Complement a Vulnerability Management Program with PowerShell

WhitepaperSecurity Awareness
  • 10 Aug 2017

Offensive Intrusion Analysis: Uncovering Insiders with Threat Hunting and Active Defense

WhitepaperDigital Forensics and Incident Response
  • 21 Jul 2017