Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Incident identification through outlier analysis

WhitepaperDigital Forensics and Incident Response
  • 16 Feb 2016

Dont Always Judge a Packet by Its Cover

WhitepaperCyber Defense
  • 16 Feb 2016

Implementing the Critical Security Controls in the Cloud

WhitepaperCloud Security
  • 10 Feb 2016

The Case for Endpoint Visibility

WhitepaperCybersecurity and IT Essentials
  • 10 Feb 2016

Security through Configuration Control at Scale - An Introduction to Ansible

Whitepaper
  • 4 Feb 2016

Security Systems Engineering Approach in Evaluating Commercial and Open Source Software Products

WhitepaperCyber Defense
  • 29 Jan 2016

Active Defense Through Deceptive Configuration Techniques

WhitepaperCyber Defense
  • 29 Jan 2016

Intrusion Detection and Prevention Systems Cheat Sheet: Choosing the Best Solution, Common Misconfigurations, Evasion Techniques, and Recommendations.

Whitepaper
  • 25 Jan 2016

The Impact of Dragonfly Malware on Industrial Control Systems

WhitepaperIndustrial Control Systems Security
  • 22 Jan 2016

Implementing Least Privilege in an SMB

WhitepaperCyber Defense
  • 20 Jan 2016

Using Virtualization in Internal Forensic Training and Assessment

WhitepaperDigital Forensics and Incident Response
  • 20 Jan 2016

Detecting Malware and Sandbox Evasion Techniques

WhitepaperDigital Forensics and Incident Response
  • 20 Jan 2016