Filter by Topic

248 Results Found
131 - 140 of 248 results
The Beginner’s Guide to Secure Cloud Configurations
Published on 02.25.2021
The Beginner’s Guide to Secure Cloud Configurations
Over the past decade, organizations around the world rapidly shifted how they use IT platforms, networks, and devices to support their missions. ...

Cybersecurity Quarterly Winter 2020
Published on 12.22.2020
Cybersecurity Quarterly Winter 2020
The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of the Center for Internet Security, working together to fight c...

Establishing Basic Cyber Hygiene Through a Managed Service Provider
Published on 12.07.2020
Establishing Basic Cyber Hygiene Through a Managed Service Provider
Small and medium enterprises often face the need to outsource their information technology infrastructure and services. Managed Service Providers...

Exploited Protocols: Remote Desktop Protocol (RDP)
Published on 11.30.2020
Exploited Protocols: Remote Desktop Protocol (RDP)
We are at a point in cybersecurity where offense must inform defense in order to help protect against the most prolific cyber threats to our envi...

2020 Nationwide Cybersecurity Review
Published on 11.15.2020
2020 Nationwide Cybersecurity Review
The 2020 Nationwide Cybersecurity Review surveyed 2,934 SLTT organizations for insight on their overall cybersecurity maturity.

CIS Videoconferencing Security Guide
Published on 10.26.2020
CIS Videoconferencing Security Guide
Videoconferencing is a great way to connect with co-workers and peers, especially when in-person meetings aren’t possible or feasible. Videoconfe...

Managing Cyber Threats through Effective Governance
Published on 10.16.2020
Managing Cyber Threats through Effective Governance
A Call to Action for Governors and State Legislatures The Center for Internet Security (CIS), the Center for Technology in Government at the Univ...

Activity Alert: Emotet Malware
Published on 10.06.2020
Activity Alert: Emotet Malware
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for...

Cybersecurity Quarterly Fall 2020
Published on 09.29.2020
Cybersecurity Quarterly Fall 2020
The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...

LokiBot Malware
Published on 09.22.2020
LokiBot Malware
Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framew...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions