Group Purchasing
Group Purchasing

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Leveraging Large Language Models for Cross-Vendor Firewall Configuration Migration: A Comparative Case Study of Claude and ChatGPT

WhitepaperDigital Forensics and Incident Response
  • 12 May 2026

Autonomous Defense Induced Disruption: How AI-Driven Automated Response Can Be Manipulated to Disrupt Enterprise Operations

WhitepaperArtificial Intelligence
  • 12 May 2026

A Forensic Study of Artifact Persistence in Containerd-Based Kubernetes Workloads

WhitepaperDigital Forensics and Incident Response
  • 12 May 2026

Your Sensitive Data Has Left the Chat: LLMs as Sensitive Data Detectors

WhitepaperArtificial Intelligence
  • 12 May 2026

Applying CIS Controls to AI Workflows

WhitepaperDigital Forensics and Incident Response
  • 12 May 2026
  • Brian Ventura

SANS AI Security Maturity Model™ eBook

WhitepaperArtificial Intelligence
  • 11 May 2026
  • Chris Cochran

Closing the Hypervisor Security Gap

WhitepaperCyber Defense
  • 30 Apr 2026
  • Megan Roddie-Fonseca

Air-Gapped: Isolation in an Always-Connected World

WhitepaperSecurity Awareness
  • 30 Apr 2026
  • My-Ngoc Nguyen

In-Depth Endpoint Forensics and Response at Scale

WhitepaperCyber Defense, Digital Forensics and Incident Response
  • 30 Apr 2026
  • Matt Bromiley

When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self-Learning AI

WhitepaperArtificial Intelligence
  • 24 Apr 2026
  • Matt Bromiley

Comprehensive Identity Protection for Today’s Enterprise

WhitepaperSecurity Awareness
  • 24 Apr 2026
  • Matt Bromiley

Sanitized in the Source: Removing Embedded Objects from PLC Projects with CDR

WhitepaperIndustrial Control Systems Security
  • 16 Apr 2026