Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Deception Techniques as Part of Intrusion Detection Strategy

WhitepaperDigital Forensics and Incident Response
  • 1 Aug 2016

Realistic Risk Management Using the CIS 20 Security Controls

WhitepaperCybersecurity Leadership
  • 1 Aug 2016

Hardware Keyloggers

WhitepaperCyber Defense
  • 29 Jul 2016

Physical Security and Why It Is Important

WhitepaperCybersecurity and IT Essentials
  • 28 Jul 2016

Polymorphic, multi-lingual websites: A theoretical approach for improved website security

Whitepaper
  • 25 Jul 2016
  • Jonathan Risto

Implementing the Critical Security Control: Controlled Use of Administrative Privileges

WhitepaperCybersecurity and IT Essentials
  • 25 Jul 2016

Portable System for Network Forensics Data Collection and Analysis

WhitepaperDigital Forensics and Incident Response
  • 15 Jul 2016
  • Don Murdoch

Endpoint Security through Device Configuration, Policy and Network Isolation

Whitepaper
  • 15 Jul 2016

Scalable Methods for Conducting Cyber Threat Hunt Operations

WhitepaperDigital Forensics and Incident Response
  • 14 Jul 2016

Using Information Security as an Auditing Tool

WhitepaperCybersecurity Leadership
  • 14 Jul 2016

How to Target Critical Infrastructure: The Adversary Return on Investment from an Industrial Control System

WhitepaperCybersecurity Leadership
  • 12 Jul 2016

Success Rates for Client Side Vulnerabilities

Whitepaper
  • 14 Jun 2016
  • Jonathan Risto