Skip to main content

Cybersecurity Research Papers

Master's degree candidates at SANS.edu conduct research that is relevant, has real world impact, and often provides cutting-edge advancements to the field of cybersecurity, all under the guidance and review of our world-class instructors.

Showing 12 of 749

Inside the Five Most Dangerous New Attack Techniques

Research PaperCloud Security, Digital Forensics and Incident Response, Cybersecurity Leadership, Artificial Intelligence, Industrial Control Systems Security

Containers are at the frontline of modern organizations. Protecting them is of utmost importance as they support critical business processes. The popular shift-left security approach for containers is adding value for short-lived containers; however, as containers persist over time, runtime security becomes essential to limit the impact of any successful attack.

  • 8 Dec 2025
  • Heather Barnhart, Rob T. Lee, Joshua Wright, Tim Conway

Infrastructure as Code-Driven Group Policy Infrastructure: A Comprehensive Engine for Group Policy Architecture and Enforcement

Research PaperCyber Defense

This study introduces a PowerShell-based Infrastructure as Code (IaC) engine developed to automate the setup and enforcement of a STIG-compliant Group Policy framework.

  • 5 Dec 2025

Marketing or Added Value? The Truth About Purpose-Built Detection and Response for Containers

Research PaperCloud Security

Containers are at the frontline of modern organizations. Protecting them is of utmost importance as they support critical business processes. The popular shift-left security approach for containers is adding value for short-lived containers; however, as containers persist over time, runtime security becomes essential to limit the impact of any successful attack.

  • 5 Dec 2025

SANS 2025 Detection and Response Survey Webcast and Forum

Research PaperCyber Defense

As cyber threats grow in complexity and frequency, organizations' strategies for detection and response must continuously evolve. The SANS 2025 Detection and Response Survey white paper delves into the current state of cybersecurity operations, questioning whether the heavy emphasis on endpoint detection is creating new blind spots.

  • 26 Nov 2025
  • Josh Lemon

Eliminate Endpoint Blind Spots: Real-Time Security and Governance with Autonomous AI

Research PaperCybersecurity Insights

Tanium’s Autonomous Endpoint Management (AEM) offers a new path forward. AEM combines real-time visibility with artificial intelligence and automation, allowing organizations to safely manage their enterprise at scale while remaining continuously updated through live data.

  • 25 Nov 2025
  • Jonathan Risto

Enhancing Security Operations with Google Threat Intelligence

Research PaperOffensive Operations

This product review examines how Google Threat Intelligence's extensive data sources, real-time insights, and investigative capabilities can elevate SecOps workflows and strengthen an organization’s defensive posture.

  • 24 Nov 2025
  • Dave Shackleford

No-Cost Detection of Endpoint Hard Drive Removal

Research PaperArtificial Intelligence

This paper analyzes low-cost detection methods, using existing hard drive counters from Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) and the Windows Registry, for their fidelity in detecting hard drive removal.

  • 19 Nov 2025

Defending Vulnerable Populations Against Scams: Effectiveness of Browser Extensions in Mitigating Scammer Attack Chains

Research PaperCyber Defense

This research evaluates the effectiveness of a browser extension as a security control—Grandma’s Guardian—designed for simplicity and accessibility so that even non-technical home users can benefit from enterprise-grade protection.

  • 19 Nov 2025

Measuring Malware Obfuscation: Evaluating CNN- Based Detection for Real-World Resilience

Research PaperDigital Forensics and Incident Response

This study examined how layered obfuscation affects image-based convolutional neural network (CNN) detectors and introduces a novel, reproducible framework for measuring obfuscation itself.

  • 19 Nov 2025

New-to-Cyber Field Manual: How to Break In, Build Skills, and Find Your Path in Cybersecurity

Research PaperCybersecurity and IT Essentials

New-to-Cyber Field Manual: How to Break In, Build Skills, and Find Your Path in Cybersecurity

  • 11 Nov 2025
  • SANS Institute

Autonomous Endpoint Management: Next-Gen Endpoint Visibility Fueling SecOps and IT Ops with AI

Research PaperCloud Security

This First Look outlines how Tanium’s single-agent architecture and AI-powered capabilities empower teams to operate from a shared source of truth, reduce operational overhead, and achieve measurable ROI.

  • 10 Nov 2025
  • Matt Bromiley

Code Modularity as a Heuristic for Malware Design

Research PaperIndustrial Control Systems Security

Malware targeting industrial control systems (ICS) and critical infrastructure often exhibits a modular architecture, using a central loader to execute interchangeable payload modules.

  • 7 Nov 2025