Filter

274 Results Found

Solutions

Industry

171 - 180 of 274 results
Exploited Protocols: Remote Desktop Protocol (RDP)
Published on 11.30.2020
We are at a point in cybersecurity where offense must inform defense in order to help protect against the most prolific cyber threats to our envi...
CIS Controls

2020 Nationwide Cybersecurity Review
Published on 11.15.2020
The 2020 Nationwide Cybersecurity Review surveyed 2,934 SLTT organizations for insight on their overall cybersecurity maturity.
MS-ISAC

CIS Videoconferencing Security Guide
Published on 10.26.2020
Videoconferencing is a great way to connect with co-workers and peers, especially when in-person meetings aren’t possible or feasible. Videoconfe...
CIS BenchmarksCIS Controls

Managing Cyber Threats through Effective Governance
Published on 10.16.2020
A Call to Action for Governors and State Legislatures The Center for Internet Security (CIS), the Center for Technology in Government at the Univ...
MS-ISAC

Activity Alert: Emotet Malware
Published on 10.06.2020
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for...
MS-ISAC

Cybersecurity Quarterly Fall 2020
Published on 09.29.2020
The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...
CIS CyberMarket

LokiBot Malware
Published on 09.22.2020
Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framew...
MS-ISAC

CIS Critical Security Controls v7.1 and Sub-Controls Mapping to PCI DSS
Published on 09.18.2020
This document maps CIS Critical Security Controls v7.1 to the Payment Card Industry Data Security Standard (PCI DSS).
CIS ControlsFinance

2019 Center for Internet Security Year in Review
Published on 08.07.2020
2019 was a fast-paced and highly-productive year for the Center for Internet Security, Inc. (CIS). We continued to experience remarkable growth i...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services

CIS Community Defense Model for CIS Controls v7.1
Published on 07.31.2020
This paper presents the CIS Community Defense Model (CDM)—our way to bring more rigor, analytics, and transparency to the security recommendation...
CIS Controls

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions