Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Attack and Defend: Linux Privilege Escalation Techniques of 2016

Whitepaper
  • 30 Jan 2017

Using COIN Doctrine to Improve Cyber Security Policies

WhitepaperCybersecurity Leadership
  • 27 Jan 2017

Building and Maintaining a Denial of Service Defense for Businesses

WhitepaperCybersecurity and IT Essentials
  • 25 Jan 2017

Superfish and TLS: A Case Study of Betrayed Trust and Legal Liability

Whitepaper
  • 24 Jan 2017

Intrusion Detection Evasion Techniques and Case Studies

WhitepaperCyber Defense
  • 23 Jan 2017

Minimizing Legal Risk When Using Cybersecurity Scanning Tools

WhitepaperCybersecurity Leadership
  • 19 Jan 2017

Packets Don't Lie: LogRythm NetMon Freemium Review

WhitepaperCyber Defense
  • 18 Jan 2017
  • Dave Shackleford

Leveraging the Asset Inventory Database

WhitepaperCybersecurity and IT Essentials
  • 4 Jan 2017

Data Breach Impact Estimation

Whitepaper
  • 3 Jan 2017

Is Anyone Out There? Monitoring DNS for Misuse

WhitepaperCyber Defense
  • 30 Dec 2016

Real-World Case Study: The Overloaded Security Professional's Guide to Prioritizing Critical Security Controls

WhitepaperCybersecurity and IT Essentials
  • 27 Dec 2016

Legal Considerations When Creating an Incident Response Plan

WhitepaperCybersecurity Leadership
  • 22 Dec 2016