White Papers
Download guides, security framework mappings, and other documents
Filter
274 Results Found
Solutions
Industry
191 - 200 of 274 results
Published on 04.16.2020
According to the results of the CSO Pandemic Impact Survey, 61% of the security and IT leader respondents are concerned about an increase in cybe...
CIS ControlsMS-ISAC
Published on 03.31.2020
The CIS Critical Security Controls Implementation Groups take a “horizontal” look across all of the CIS Controls and identify a set of Sub-Contro...
CIS Controls
Published on 03.30.2020
The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 ...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services
Published on 03.03.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite
Published on 02.24.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
CIS SecureSuite
Published on 02.10.2020
Recommendations for state and local election offices to invest these funds in cybersecurity initiatives.
Published on 01.29.2020
A Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
CIS Controls
Published on 01.10.2020
Overview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
CIS SecureSuite
Published on 12.30.2019
Overview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
CIS Controls
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More