Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Using windows crash dumps for remote incident identification

WhitepaperDigital Forensics and Incident Response
  • 16 Jun 2015

Applying Lessons Learned for the Next Generation Vulnerability Management System

WhitepaperCybersecurity Leadership
  • 8 Jun 2015

The Perfect ICS Storm

WhitepaperIndustrial Control Systems Security
  • 8 Jun 2015

Practical Attack Detection, Analysis, and Response using Big Data, Semantics, and Kill Chains within the OODA Loop

Whitepaper
  • 3 Jun 2015

Integration of Network Conversation Metadata with Asset and Configuration Management Databases

WhitepaperCybersecurity Leadership
  • 26 May 2015

Automated Security Testing of Oracle Forms Applications

Whitepaper
  • 26 May 2015

Knitting SOCs

WhitepaperDigital Forensics and Incident Response
  • 26 May 2015

Lenovo and the Terrible, Horrible, No Good, Very Bad Week

Whitepaper
  • 21 May 2015
  • Shaun McCullough

IPv6 and Open Source IDS

WhitepaperCyber Defense
  • 14 May 2015

Honeytokens and honeypots for web ID and IH

WhitepaperDigital Forensics and Incident Response
  • 14 May 2015

IDS File Forensics

WhitepaperDigital Forensics and Incident Response
  • 13 May 2015

Nftables as a Second Language

WhitepaperCyber Defense
  • 11 May 2015