White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
241 Results Found
151 - 160 of 241 results
Published on 02.24.2020
Intel Insights: How to Restrict Server Message BlockOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 02.10.2020
Technology Recommendations for Federal Election Security FundingRecommendations for state and local election offices to invest these funds in cybersecurity initiatives.
Published on 01.29.2020
How to Improve Election Technology VerificationA Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
Published on 01.10.2020
Security Primer – RyukOverview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
Published on 12.30.2019
Intel Insights: How to Secure PowerShellOverview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
Published on 12.24.2019
Security and Privacy Controls for Federal Information Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
Published on 12.24.2019
Protecting Controlled Unclassified Information in Nonfederal Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
Published on 12.19.2019
Intel Insights: How to Disable Remote Desktop ProtocolOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 12.18.2019
2018 Nationwide Cybersecurity Review (NCSR): Summary ReportThis summary report describes key findings from the 2018 NCSR.
Published on 11.15.2019
2019 Nationwide Cybersecurity ReviewThe 2019 Nationwide Cybersecurity Review surveyed 3,135 SLTT organizations for insight on their overall cybersecurity maturity.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More