Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Building a Forensically Capable Network Infrastructure

WhitepaperCyber Defense
  • 23 Aug 2016
  • Nik Alleyne

Simple Approach to Access Control: Port Control and MAC Filtering

WhitepaperCybersecurity and IT Essentials
  • 22 Aug 2016

In but not Out: Protecting Confidentiality during Penetration Testing

Whitepaper
  • 22 Aug 2016

Incident Handling Preparation: Learning Normal with the Kansa PowerShell Incident Response Framework

WhitepaperDigital Forensics and Incident Response
  • 22 Aug 2016

Filling the Gaps

WhitepaperCybersecurity Leadership
  • 18 Aug 2016

Generating Hypotheses for Successful Threat Hunting

WhitepaperCybersecurity and IT Essentials
  • 15 Aug 2016
  • Robert M. Lee, David Bianco

Investing in Information Security: A Case Study in Community Banking

WhitepaperCybersecurity Leadership
  • 12 Aug 2016

Introduction to Rundeck for Secure Script Executions

WhitepaperCybersecurity Leadership
  • 11 Aug 2016

Data Loss Prevention - Devlin

Whitepaper
  • 8 Aug 2016

Changing the Perspective of Information Security in the Cloud: Cloud Access Security Brokers and Cloud Identity and Access Management

WhitepaperCloud Security
  • 4 Aug 2016

Is there a Yelp for Ransomware?' Incident response planning that doesn't rely on Plan B

WhitepaperDigital Forensics and Incident Response
  • 1 Aug 2016

Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS

WhitepaperCybersecurity Leadership
  • 1 Aug 2016