White Papers
Download guides, security framework mappings, and other documents
Filter
296 Results Found
Solutions
Industry
221 - 230 of 296 results
Published on 12.30.2019
Overview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
CIS Controls
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
CIS Controls
Published on 12.19.2019
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite
Published on 12.18.2019
This summary report describes key findings from the 2018 NCSR.
MS-ISAC
Published on 11.15.2019
The 2019 Nationwide Cybersecurity Review surveyed 3,135 SLTT organizations for insight on their overall cybersecurity maturity.
MS-ISAC
Published on 09.18.2019
Overview IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper ...
MS-ISACCIS SecureSuite
Published on 09.09.2019
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format.
CIS Controls
Published on 09.06.2019
Overview This white paper provides information on general malware operations, IDS event types, requirements, recommendations, and references. Tec...
MS-ISAC
Published on 08.27.2019
Routers, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are dev...
CIS Controls
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More







