Filter by Topic

221 Results Found
21 - 30 of 221 results
MS-ISAC Guide to DDoS Attacks
Published on 05.24.2023
MS-ISAC Guide to DDoS Attacks
In this guide, the MS-ISAC discusses methods and techniques which CTAs use to generate a DDoS attack. It also recommends how to defend against a ...

Internet of Things: Embedded Security Guidance
Published on 05.17.2023
Internet of Things: Embedded Security Guidance
Our whitepaper helps IoT vendors provide embedded security on their devices by establishing a framework for protocol standards across constrained...

Acceptable Use Policy Template for the CIS Controls
Published on 04.28.2023
Acceptable Use Policy Template for the CIS Controls
CIS has released an Acceptable Use Policy Template that's meant to supplement the CIS Critical Security Controls (CIS Controls) v8.

Living Off the Land: Scheduled Tasks
Published on 04.18.2023
Living Off the Land: Scheduled Tasks
Living off the Land (LotL) attacks involve the use of existing tools and tactics on targeted systems or networks to carry out a cyber attack, ren...

Cybersecurity Quarterly Spring 2023
Published on 04.10.2023
Cybersecurity Quarterly Spring 2023
The Spring 2023 issue of Cybersecurity Quarterly focuses on collaboration, with articles discussing the 20th anniversary of the MS-ISAC, our coll...

2022 Year in Review
Published on 03.31.2023
2022 Year in Review
For CIS, 2022 was a year of tremendous growth and major accomplishments. Our 2022 Year in Review tells the full story.

Security Awareness Skills Training Policy Template for CIS Control 14
Published on 03.31.2023
Security Awareness Skills Training Policy Template for CIS Control 14
CIS has released a Security Awareness Training Policy Template to supplement CIS Control 14 of the CIS Critical Security Controls v8.

RABET-V Final Pilot Summary and Next Steps
Published on 03.28.2023
RABET-V Final Pilot Summary and Next Steps
CIS wraps up the final pilot of RABET-V as it works to make the process a permanent, operational interest within the election community.

Incident Response Policy Template for CIS Control 17
Published on 03.22.2023
Incident Response Policy Template for CIS Control 17
CIS has released an Incident Response Policy Template for CIS Control 17 of the CIS Critical Security Controls v8.

Data Recovery Policy Template for CIS Control 11
Published on 03.22.2023
Data Recovery Policy Template for CIS Control 11
CIS has released a Data Recovery Policy Template to supplement CIS Control 11 of the CIS Critical Security Controls v8.

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions