Filter by Topic

241 Results Found
161 - 170 of 241 results
Fall 2019 Threat of the Quarter: Ryuk Ransomware
Published on 09.23.2019
Fall 2019 Threat of the Quarter: Ryuk Ransomware
Throughout 2019, state, local, tribal, and territorial (SLTT) government entities increasingly encounter ransomware attacks resulting in signific...

Security Primer – IcedID
Published on 09.18.2019
Security Primer – IcedID
Overview IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper ...

NIST OLIR Submission V1
Published on 09.09.2019
NIST OLIR Submission V1
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.

Security Event Primer – Malware
Published on 09.06.2019
Security Event Primer – Malware
Overview This white paper provides information on general malware operations, IDS event types, requirements, recommendations, and references. Tec...

CIS Critical Security Controls v7.1 Telework and Small Office Network Security Guide
Published on 08.27.2019
CIS Critical Security Controls v7.1 Telework and Small Office Network Security Guide
Routers, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are dev...

Public Sector Cyber Defense Guide
Published on 08.18.2019
Public Sector Cyber Defense Guide
Organizations rely on different cybersecurity products and services to help bolster their defenses. By comparing available services with best pra...

CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001
Published on 07.16.2019
CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.

CIS Hardware and Software Asset Tracking Spreadsheet
Published on 07.10.2019
CIS Hardware and Software Asset Tracking Spreadsheet
This document contains examples of methods for tracking hardware, software, and sensitive information in an organization.

CIS Critical Security Controls v7.1 Microsoft Windows 10 Cyber Hygiene Guide
Published on 07.10.2019
CIS Critical Security Controls v7.1 Microsoft Windows 10 Cyber Hygiene Guide
This guide provides detailed information on how to accomplish each of the CIS Sub-Controls within Implementation Group 1 (IG1). This guide builds...

CIS Controls Internet of Things Companion Guide Mapping Applicability
Published on 06.27.2019
CIS Controls Internet of Things Companion Guide Mapping Applicability
Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions