CIS Logo
tagline: Confidence in the Connected World


The Winter 2019 issue of Cybersecurity Quarterly covers everything from how to stop holiday scams to lifting up the new generation of cyber professionals.


Learn what Remote Desktop Protocol (RDP) is, how misconfigured RDP can be leveraged by cybercriminals, and what to do about it.


The 2018 NCSR provides insight on the level of maturity of state, local, tribal, and territorial information security programs from year to year.


TrickBot is a modular banking trojan that uses man-in-the-browser attacks to target user financial information and act as a dropper for other malware.


Ransomware is a type of malware that blocks access to a system, device, or file until a ransom is paid. Here are some guidelines to prevent digital damage.


The Fall 2019 issue of Cybersecurity Quarterly shares ways to protect against ransomware, the latest guide for implementing the CIS Controls and more.


Ryuk is a type of crypto-ransomware that uses encryption to block access to a system, device, or file until a ransom is paid.


Security Primer – IcedID
September 18, 2019
IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper for other malware.


NIST OLIR Submission V1
September 9, 2019
This document is a mapping of the CIS Controls to the NIST Cybersecurity Framework using the NIST Online Informative References (OLIR) format. 


This Security Event Primer provides information on general malware operations, IDS event types, requirements, recommendations, and references.


The Telework and Small Office Network Security Guide is meant to assist in securing commodity routers, modems, and other network devices.


Find out how your U.S. State, Local, Tribal, or Territorial (SLTT) government organization can build a stronger cyber defense program.


This document provides a detailed mapping of the relationships between the CIS Controls and ISO 27001.


This document contains examples of methods for tracking hardware, software, and sensitive information in an



The CIS Controls Microsoft Windows 10 Cyber Hygiene Guide offers practical guidance on cyber hygiene for Windows 10 users


1 2 3 4 9