Talk With an Expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

Automating Generative AI Guidelines: Reducing Prompt Injection Risk with 'Shift-Left' MITRE ATLAS Mitigation Testing

WhitepaperArtificial Intelligence
  • 7 Nov 2025

Structural Vulnerability: Autodesk Revit Server WAN Exposure Versus Cost of Autodesk Construction Cloud

WhitepaperSecurity Awareness, Cybersecurity Leadership
  • 7 Nov 2025

Code Modularity as a Heuristic for Malware Design

WhitepaperIndustrial Control Systems Security
  • 7 Nov 2025

Scrutinizing A Web-Based LLM in Private Browsing Mode: An Analysis of Memory Artifacts and Privacy Implications

WhitepaperDigital Forensics and Incident Response
  • 7 Nov 2025

Can Your Security Stack Handle AI? An Empirical Assessment of Enterprise Controls Versus Generative AI Risks

WhitepaperArtificial Intelligence
  • 6 Nov 2025

Evaluating Large Language Models for Automated Threat Modeling: A Comparative Analysis

WhitepaperArtificial Intelligence
  • 6 Nov 2025

Building Scalable Detection-as-Code Pipelines with Agentic Validation and Refinement

WhitepaperCyber Defense
  • 6 Nov 2025

Isolated Trust: Zero Trust in Standalone Systems

WhitepaperCyber Defense
  • 6 Nov 2025

Modernizing OT Security: How Frenos Uses Digital Twin Technology, AI and Threat Emulation to Transform Security Posture and Compliance

WhitepaperArtificial Intelligence
  • 28 Oct 2025
  • Jason Dely, Tim Conway

Adversary-Aware IOC Retention: Analyzing Time-to-Live Patterns by Threat Actor Attribution

WhitepaperDigital Forensics and Incident Response
  • 23 Oct 2025

Breaking Time: Methods, Artifacts, and Forensic Detection of Timestomping on FAT32, Ext3, and Ext4 File Systems

WhitepaperDigital Forensics and Incident Response
  • 23 Oct 2025

Breaking Through Deception: Addressing Barriers in the Adoption of Cyber Deception Technologies

WhitepaperDigital Forensics and Incident Response
  • 23 Oct 2025