Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

NERC CIP Patch Management and Cisco IOS Trains

WhitepaperCybersecurity Leadership
  • 14 Sep 2015

A Network Analysis of a Web Server Compromise

WhitepaperDigital Forensics and Incident Response
  • 8 Sep 2015

The Sliding Scale of Cyber Security

WhitepaperCybersecurity Leadership
  • 1 Sep 2015

Detecting and Preventing Attacks Earlier in the Kill Chain

WhitepaperCybersecurity and IT Essentials
  • 31 Aug 2015

The Fall of SS7 - How Can the Critical Security Controls Help?

WhitepaperCybersecurity and IT Essentials
  • 31 Aug 2015

Breaking the Ice: Gaining Initial Access

Whitepaper
  • 28 Aug 2015

Protecting Third Party Applications with RASP Infographic

WhitepaperCybersecurity Leadership
  • 27 Aug 2015

What Companies need to consider for e-Discovery

WhitepaperCybersecurity Leadership
  • 24 Aug 2015

Deployment of a Flexible Malware Sandbox Environment Using Open Source Software

WhitepaperDigital Forensics and Incident Response
  • 24 Aug 2015

Preventing data leakage: A risk based approach for controlled use of the use of administrative and access privileges

WhitepaperCybersecurity Leadership
  • 24 Aug 2015

Paying Attention to Critical Controls

WhitepaperCybersecurity and IT Essentials
  • 21 Aug 2015

Configuration Management with Windows PowerShell Desired State Configuration (DSC)

WhitepaperCyber Defense
  • 18 Aug 2015