Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Unveiling PikaBot: Optimizing Intrusion Detection for Evolving Malware Threat

WhitepaperCyber Defense
  • 11 Jun 2024

SANS 2024 Application Security & API Survey: Protecting our Applications and APIs

WhitepaperSecurity Awareness, Offensive Operations
  • 5 Jun 2024
  • Matt Bromiley, David Hazar

How to Use NERC-CIP: An Overview of the Standards and Their Deployment with Fortinet

WhitepaperIndustrial Control Systems Security
  • 1 Jun 2024
  • Stephen Mathezer

Optimizing Security Operations with Palo Alto Networks’ Cortex XSOAR

WhitepaperCyber Defense
  • 31 May 2024
  • Matt Bromiley

Detecting Cypher Injection with Open-Source Network Intrusion Detection

WhitepaperCyber Defense
  • 29 May 2024

SANS CISO Primer: 4 Cyber Trends That Will Move the Needle in 2024

WhitepaperCybersecurity Leadership
  • 25 May 2024
  • James Lyne

QUIC-Tun: QUIC Firewall Evasion

WhitepaperCyber Defense
  • 23 May 2024

The Five ICS Cybersecurity Critical Controls and the Electric Sector

WhitepaperIndustrial Control Systems Security
  • 23 May 2024
  • Dean Parsons

SANS 2024 CTI Survey: Managing the Evolving Threat Landscape

WhitepaperCybersecurity and IT Essentials
  • 21 May 2024
  • Rebekah Brown, Andreas Sfakianakis

Protecting Critical Water Systems with the Five ICS Cybersecurity Critical Controls

WhitepaperIndustrial Control Systems Security
  • 20 May 2024
  • Dean Parsons

Beyond the Inbox: Strategies for Safeguarding Your Organization's Email Communications

WhitepaperDigital Forensics and Incident Response
  • 7 May 2024

You Can Run but You Cannot Hide (In Process Memory): Observing Process Injection with eBPF in Linux

WhitepaperDigital Forensics and Incident Response
  • 3 May 2024