White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
241 Results Found
121 - 130 of 241 results
Published on 05.18.2021
CIS Critical Security Controls v8 Mobile Companion GuideThe security challenges facing the usage of mobile devices in the enterprise warrant additional attention. While many of the core security concer...
Published on 04.27.2021
The 2020 Elections Year in ReviewIn the 2020 General Election, the Center for Internet Security’s (CIS) dedicated staff and our partners worked tirelessly to apply lessons learne...
Published on 03.30.2021
Cybersecurity Quarterly Spring 2021The Spring 2021 issue focuses on overall security using the CIS Controls, strengthening the healthcare industry’s cyber defenses, and protecting ...
Published on 02.25.2021
The Beginner’s Guide to Secure Cloud ConfigurationsOver the past decade, organizations around the world rapidly shifted how they use IT platforms, networks, and devices to support their missions. ...
Published on 12.22.2020
Cybersecurity Quarterly Winter 2020The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of the Center for Internet Security, working together to fight c...
Published on 12.07.2020
Establishing Basic Cyber Hygiene Through a Managed Service ProviderSmall and medium enterprises often face the need to outsource their information technology infrastructure and services. Managed Service Providers...
Published on 11.30.2020
Exploited Protocols: Remote Desktop Protocol (RDP)We are at a point in cybersecurity where offense must inform defense in order to help protect against the most prolific cyber threats to our envi...
Published on 11.15.2020
2020 Nationwide Cybersecurity ReviewThe 2020 Nationwide Cybersecurity Review surveyed 2,934 SLTT organizations for insight on their overall cybersecurity maturity.
Published on 10.26.2020
CIS Videoconferencing Security GuideVideoconferencing is a great way to connect with co-workers and peers, especially when in-person meetings aren’t possible or feasible. Videoconfe...
Published on 10.16.2020
Managing Cyber Threats through Effective GovernanceA Call to Action for Governors and State Legislatures The Center for Internet Security (CIS), the Center for Technology in Government at the Univ...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More