White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
243 Results Found
151 - 160 of 243 results
Published on 03.30.2020
Cybersecurity Quarterly – Spring 2020The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 ...
Published on 03.03.2020
Intel Insight: How to Disable MacrosOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 02.24.2020
Intel Insights: How to Restrict Server Message BlockOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 02.10.2020
Technology Recommendations for Federal Election Security FundingRecommendations for state and local election offices to invest these funds in cybersecurity initiatives.
Published on 01.29.2020
How to Improve Election Technology VerificationA Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
Published on 01.10.2020
Security Primer – RyukOverview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
Published on 12.30.2019
Intel Insights: How to Secure PowerShellOverview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
Published on 12.24.2019
Security and Privacy Controls for Federal Information Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
Published on 12.24.2019
Protecting Controlled Unclassified Information in Nonfederal Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
Published on 12.19.2019
Intel Insights: How to Disable Remote Desktop ProtocolOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More