White Papers
Download guides, security framework mappings, and other documents
Filter by Topic
248 Results Found
161 - 170 of 248 results
Published on 01.10.2020
Security Primer – RyukOverview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
Published on 12.30.2019
Intel Insights: How to Secure PowerShellOverview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
Published on 12.24.2019
Security and Privacy Controls for Federal Information Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
Published on 12.24.2019
Protecting Controlled Unclassified Information in Nonfederal Systems and OrganizationsThis document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
Published on 12.19.2019
Intel Insights: How to Disable Remote Desktop ProtocolOverview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
Published on 12.18.2019
2018 Nationwide Cybersecurity Review (NCSR): Summary ReportThis summary report describes key findings from the 2018 NCSR.
Published on 11.15.2019
2019 Nationwide Cybersecurity ReviewThe 2019 Nationwide Cybersecurity Review surveyed 3,135 SLTT organizations for insight on their overall cybersecurity maturity.
Published on 09.23.2019
Fall 2019 Threat of the Quarter: Ryuk RansomwareThroughout 2019, state, local, tribal, and territorial (SLTT) government entities increasingly encounter ransomware attacks resulting in signific...
Published on 09.18.2019
Security Primer – IcedIDOverview IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper ...
Published on 09.09.2019
NIST OLIR Submission V1This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More