Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Preparing to withstand a DDoS Attack

WhitepaperDigital Forensics and Incident Response
  • 2 Nov 2015

Learning from the Dridex Malware - Adopting an Effective Strategy

WhitepaperCyber Defense
  • 29 Oct 2015

The Business Case for TLS Certificate Enterprise Key Management of Web Site Certificates: Wrangling TLS Certificates on the Wild Web

WhitepaperCybersecurity Leadership
  • 28 Oct 2015

The Scary and Terrible Code Signing Problem You Don't Know You Have

WhitepaperCybersecurity and IT Essentials
  • 28 Oct 2015

Security Data Visualization

WhitepaperCybersecurity Leadership
  • 28 Oct 2015

Audits Made Simple

WhitepaperCybersecurity and IT Essentials
  • 27 Oct 2015

Case Study: The Home Depot Data Breach

WhitepaperCybersecurity and IT Essentials
  • 27 Oct 2015

Technical Implementation of the Critical Control 'Inventory of Authorized and Unauthorized Devices' for a Small Office/Home Office

WhitepaperCybersecurity and IT Essentials
  • 26 Oct 2015

Email Acceptable Use: Balancing the Needs of the Organization and the Need to Comply with National Labor Relations Board Rulings

WhitepaperCybersecurity Leadership
  • 26 Oct 2015

Uncovering Indicators of Compromise (IoC) Using PowerShell, Event Logs and a Traditional Monitoring Tool

WhitepaperDigital Forensics and Incident Response
  • 26 Oct 2015

Behind the Curve? A Maturity Model for Endpoint Security

WhitepaperCybersecurity Leadership
  • 22 Oct 2015

Detecting a Targeted Data Breach with Ease: A SANS Product Review

WhitepaperCybersecurity and IT Essentials
  • 21 Oct 2015
  • Jake Williams