Talk With an Expert

Cybersecurity Blogs

Stay informed with the latest cybersecurity insights and trending topics from SANS faculty and industry thought leaders. Explore in-depth analysis, training updates, and expert perspectives deepening your knowledge and skills.

Filter by:

Authorization Sprawl: The Hidden Vulnerability Reshaping Modern Cyberattacks

BlogOffensive Operations
  • 16 Oct 2025
  • Joshua Wright
Person Writing in Journal

2025 SANS DFIR Summit Recap: The Human Element

BlogDigital Forensics and Incident Response
  • 15 Oct 2025
  • SANS Institute
Red Cloud Upload Symbols

CISA's Pre-Ransomware Notification and You

BlogDigital Forensics and Incident Response
  • 14 Oct 2025
  • Mari DeGrazia
Glowing Text Bubble on Surface

5 Steps to Build Safe Harbor for AI-Driven Cyber Defense

BlogArtificial Intelligence
  • 14 Oct 2025
  • Rob T. Lee
Man with Headphones Looking at Laptop

Preparing Your Organization’s Workforce for the Cybersecurity Threats of the Future

BlogCybersecurity Leadership
  • 13 Oct 2025
  • SANS Institute
Man Smiling at Computer

Facing Ransomware Head-On: Practical Actions for Responders

BlogDigital Forensics and Incident Response
  • 10 Oct 2025
  • Ryan Chapman
Webcast Abstract Image

Why Security Tools Alone Won’t Secure Your Code — and What Developers Really Need

BlogCybersecurity Insights
  • 7 Oct 2025
  • Serge Borso
Red Cloud Upload Symbols

The Evolution of Qilin RaaS

BlogDigital Forensics and Incident Response
  • 3 Oct 2025
  • Will Thomas
Blue Electronic Abstract

A Visual Summary of SANS CloudSecNext Summit 2025

BlogCloud Security
  • 2 Oct 2025
  • SANS Institute
Woman Smiling with Laptop

Secure the Generations: Cyber Safe at Every Stage

BlogCybersecurity Insights
  • 1 Oct 2025
  • SANS Institute
Man with Headphones Looking at Laptop

Log for Normal to Find Evil: Lessons from Real Crimes and Cyberattacks

BlogDigital Forensics and Incident Response
  • 1 Oct 2025
  • Heather Barnhart
Red Cloud Upload Symbols

Hunting SaaS Threats: Insights from the FOR589 Course on Cybercriminal Campaigns

BlogDigital Forensics and Incident Response
  • 1 Oct 2025
  • Will Thomas
Woman Smiling with Laptop