Group Purchasing
Group Purchasing

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Closing the Hypervisor Security Gap

WhitepaperCyber Defense
  • 30 Apr 2026
  • Megan Roddie-Fonseca

Air-Gapped: Isolation in an Always-Connected World

WhitepaperSecurity Awareness
  • 30 Apr 2026
  • My-Ngoc Nguyen

In-Depth Endpoint Forensics and Response at Scale

WhitepaperCyber Defense, Digital Forensics and Incident Response
  • 30 Apr 2026
  • Matt Bromiley

When Trusted Senders Become Threats: Stopping BEC and Supply Chain Attacks with Self-Learning AI

WhitepaperArtificial Intelligence
  • 24 Apr 2026
  • Matt Bromiley

Comprehensive Identity Protection for Today’s Enterprise

WhitepaperSecurity Awareness
  • 24 Apr 2026
  • Matt Bromiley

Sanitized in the Source: Removing Embedded Objects from PLC Projects with CDR

WhitepaperIndustrial Control Systems Security
  • 16 Apr 2026

Untested: An Overlooked Link in the Software Supply Chain

WhitepaperCyber Defense
  • 16 Apr 2026

Using AI for Source Code Vulnerability Analysis

WhitepaperArtificial Intelligence
  • 15 Apr 2026
  • Joshua Wright

Cyber Risk Intelligence and Security Posture (CRISP): From Compliance to Threat-Informed Intelligence

WhitepaperCyber Defense
  • 7 Apr 2026

The Next Generation of Data Security

WhitepaperCybersecurity Leadership
  • 6 Apr 2026
  • Dave Shackleford

Operationalizing CTEM within the SOC: A Proactive Approach to Threat Detection and Response

WhitepaperCyber Defense
  • 1 Apr 2026

Can Root Detection Be Trusted? A Study of Bypass Techniques on Mobile Platforms

WhitepaperOffensive Operations
  • 26 Mar 2026