White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
253 Results Found
1 - 10 of 253 results
Published on 11.25.2024
Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1Implementation Groups (IGs) help enterprises to prioritize their implementation of the CIS Controls. Download our guide to efficiently determine ...
Published on 11.25.2024
A Roadmap to the CIS Critical Security ControlsNew to the CIS Critical Security Controls? Download our guide to find out what's available to you, where to start, and how to put it all together...
Published on 10.31.2024
2024 Election Threat LandscapeElection offices must improve their preparedness for the 2024 election threat landscape. Download our joint white paper for recommendations.
Published on 10.25.2024
Reasonable Cybersecurity GuideIn the United States, there is no specification of what an organization must do to meet reasonable cybersecurity. This guide seeks to do just tha...
Published on 10.18.2024
Combatting RansomwareCyber threat actors leverage multiple attack vectors to distribute ransomware. Download our guide to learn about mitigation strategies you can im...
Published on 10.07.2024
Cybersecurity Quarterly Fall 2024The Fall 2024 issue of Cybersecurity Quarterly centers around the notion of "Adapting for the Future." Check out our articles today!
Published on 09.27.2024
Nationwide Cybersecurity Review: 2023 Summary ReportThe Nationwide Cybersecurity Review 2023 Summary Report dives into the cyber maturity of U.S. SLTTs across the nation. Download your copy today!
Published on 09.20.2024
Establishing Essential Cyber Hygiene Version 8.1Many successful cyber attacks exploit "poor hygiene." Download this guide to drive your implementation of essential cyber hygiene using the CIS C...
Published on 09.19.2024
Guide to Asset Classes: CIS Critical Security Controls v8.1You need to verify you've accounted for and secured in-scope asset classes on an ongoing basis. Download our guide to learn how CIS Controls v8.1...
Published on 09.18.2024
DMARC Guide: Microsoft 365 and Google WorkspaceSetting up DMARC is not a trivial task. Download our guide to learn how to set DMARC up for Microsoft 365 and Google Workplace email.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More