White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
248 Results Found
151 - 160 of 248 results
Published on 05.19.2020
Cybersecurity Awareness Month PostersSpread cybersecurity awareness in your office!
Published on 05.19.2020
Cybersecurity Awareness Month Posters (co-branded)Cybersecurity posters brought to you by the MS-ISAC
Published on 04.16.2020
Resource Guide for Cybersecurity During the COVID-19 PandemicAccording to the results of the CSO Pandemic Impact Survey, 61% of the security and IT leader respondents are concerned about an increase in cybe...
Published on 03.31.2020
CIS Critical Security Controls V7.1 Implementation GroupsThe CIS Critical Security Controls Implementation Groups take a “horizontal” look across all of the CIS Controls and identify a set of Sub-Contro...
Published on 03.30.2020
Cybersecurity Quarterly – Spring 2020The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 ...
Published on 03.03.2020
Intel Insight: How to Disable MacrosOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 02.24.2020
Intel Insights: How to Restrict Server Message BlockOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 02.10.2020
Technology Recommendations for Federal Election Security FundingRecommendations for state and local election offices to invest these funds in cybersecurity initiatives.
Published on 01.29.2020
How to Improve Election Technology VerificationA Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More