Filter by Topic

243 Results Found
131 - 140 of 243 results
CIS Videoconferencing Security Guide
Published on 10.26.2020
CIS Videoconferencing Security Guide
Videoconferencing is a great way to connect with co-workers and peers, especially when in-person meetings aren’t possible or feasible. Videoconfe...

Managing Cyber Threats through Effective Governance
Published on 10.16.2020
Managing Cyber Threats through Effective Governance
A Call to Action for Governors and State Legislatures The Center for Internet Security (CIS), the Center for Technology in Government at the Univ...

Activity Alert: Emotet Malware
Published on 10.06.2020
Activity Alert: Emotet Malware
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for...

Cybersecurity Quarterly Fall 2020
Published on 09.29.2020
Cybersecurity Quarterly Fall 2020
The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...

LokiBot Malware
Published on 09.22.2020
LokiBot Malware
Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framew...

CIS Critical Security Controls v7.1 and Sub-Controls Mapping to PCI DSS
Published on 09.18.2020
CIS Critical Security Controls v7.1 and Sub-Controls Mapping to PCI DSS
This document maps CIS Critical Security Controls v7.1 to the Payment Card Industry Data Security Standard (PCI DSS).

2019 Center for Internet Security Year in Review
Published on 08.07.2020
2019 Center for Internet Security Year in Review
2019 was a fast-paced and highly-productive year for the Center for Internet Security, Inc. (CIS). We continued to experience remarkable growth i...

CIS Community Defense Model for CIS Controls v7.1
Published on 07.31.2020
CIS Community Defense Model for CIS Controls v7.1
This paper presents the CIS Community Defense Model (CDM)—our way to bring more rigor, analytics, and transparency to the security recommendation...

CIS Password Policy Guide
Published on 07.29.2020
CIS Password Policy Guide
Passwords are ubiquitous in modern society. If you have an account on a computer system, there will likely be at least one password that will nee...

CIS SecureSuite Membership Digital Overview
Published on 07.20.2020
CIS SecureSuite Membership Digital Overview
CIS SecureSuite Membership provides integrated cybersecurity tools and resources to organizations of every size. Your team can automate configura...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions