Filter

271 Results Found

Solutions

Industry

191 - 200 of 271 results
Intel Insight: How to Disable Macros
Published on 03.03.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite

Intel Insights: How to Restrict Server Message Block
Published on 02.24.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
CIS SecureSuite

Technology Recommendations for Federal Election Security Funding
Published on 02.10.2020
Recommendations for state and local election offices to invest these funds in cybersecurity initiatives.

How to Improve Election Technology Verification
Published on 01.29.2020
A Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
CIS Controls

Security Primer – Ryuk
Published on 01.10.2020
Overview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
CIS SecureSuite

Intel Insights: How to Secure PowerShell
Published on 12.30.2019
Overview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite

Security and Privacy Controls for Federal Information Systems and Organizations
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
CIS Controls

Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
CIS Controls

Intel Insights: How to Disable Remote Desktop Protocol
Published on 12.19.2019
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite

2018 Nationwide Cybersecurity Review (NCSR): Summary Report
Published on 12.18.2019
This summary report describes key findings from the 2018 NCSR.
MS-ISAC

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions