CIS Logo
tagline: Confidence in the Connected World

TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.

Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.

The Fall 2019 issue of Cybersecurity Quarterly shares ways to protect against ransomware, the latest guide for implementing the CIS Controls and more.

Ryuk is a type of crypto-ransomware that uses encryption to block access to a system, device, or file until a ransom is paid.

Security Primer – IcedID
September 18, 2019
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper for other malware.

NIST OLIR Submission V1
September 9, 2019
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format. 

This Security Event Primer provides information on general malware operations, IDS event types, requirements, recommendations, and references.

The Telework and Small Office Network Security Guide is meant to assist in securing commodity routers, modems, and other network devices.

Find out how your U.S. State, Local, Tribal, or Territorial (SLTT) government organization can build a stronger cyber defense program.

This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.

This document contains examples of methods for tracking hardware, software, and sensitive information in an

The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide offers practical guidance on cyber hygiene for Windows 10 users

Cybersecurity Quarterly Summer 2019 highlights the new way to look at the CIS Controls®, malware that on the rise, and how Albert IDS can protect networks.

This guide provides cyber defense resources for organizations in the financial sector to keep PII secure and meet regulatory/industry compliance standards.

Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your process of securing IoT devices.

1 2 3 8