Filter by Topic

248 Results Found
161 - 170 of 248 results
Security Primer – Ryuk
Published on 01.10.2020
Security Primer – Ryuk
Overview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...

Intel Insights: How to Secure PowerShell
Published on 12.30.2019
Intel Insights: How to Secure PowerShell
Overview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...

Security and Privacy Controls for Federal Information Systems and Organizations
Published on 12.24.2019
Security and Privacy Controls for Federal Information Systems and Organizations
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Published on 12.24.2019
Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.

Intel Insights: How to Disable Remote Desktop Protocol
Published on 12.19.2019
Intel Insights: How to Disable Remote Desktop Protocol
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...

2018 Nationwide Cybersecurity Review (NCSR): Summary Report
Published on 12.18.2019
2018 Nationwide Cybersecurity Review (NCSR): Summary Report
This summary report describes key findings from the 2018 NCSR.

2019 Nationwide Cybersecurity Review
Published on 11.15.2019
2019 Nationwide Cybersecurity Review
The 2019 Nationwide Cybersecurity Review surveyed 3,135 SLTT organizations for insight on their overall cybersecurity maturity.

Fall 2019 Threat of the Quarter: Ryuk Ransomware
Published on 09.23.2019
Fall 2019 Threat of the Quarter: Ryuk Ransomware
Throughout 2019, state, local, tribal, and territorial (SLTT) government entities increasingly encounter ransomware attacks resulting in signific...

Security Primer – IcedID
Published on 09.18.2019
Security Primer – IcedID
Overview IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper ...

NIST OLIR Submission V1
Published on 09.09.2019
NIST OLIR Submission V1
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions