Home » Archives by category » Internet Security

Understanding CIS Control 1

Understanding CIS Control 1

To celebrate National Cyber Security Awareness Month, CIS will kick-off each week in October with a deep dive into one of the top 5 CIS Controls. Understanding CIS Control 1…

Practical Guidance for Implementing the Critical Security Controls

Practical Guidance for Implementing the Critical Security Controls

We’ve released a practical guidance document which provides an overview and introduction to the CIS Controls and includes background on the philosophy of the Controls and the community that develops the resources. Practical…

CIS Critical Security Controls Executive Summary

CIS Critical Security Controls Executive Summary

We’ve released a new document related to the Critical Security Controls which addresses feedback received from the community of Controls users. Executive Summary Want to learn more about the Critical Security…

MS-ISAC Reaches 1,000th Member

MS-ISAC Reaches 1,000th Member

This week, the Multi-State Information Sharing and Analysis Center (MS-ISAC) is celebrating its 1,000th member – the Village of Boys Town in the state of Nebraska. A unique village, the…

2016 MS-ISAC Mid-Year Review

2016 MS-ISAC Mid-Year Review

By: Ben Spear, Senior Cyber Intelligence Analyst In order to provide greater insight into the state, local, tribal, and territorial (SLTT) cybersecurity landscape we’re sharing some of the insights MS-ISAC gained…

CIS Security Benchmarks Community Newsletter – August 2016

CIS Security Benchmarks Community Newsletter – August 2016

CIS Docker 1.12.0 Benchmark Released The benchmark provides prescriptive guidance for establishing a secure configuration posture for Docker container version 1.12.0. The guide was tested against Docker 1.12.0 on RHEL…

Ransomware: Facts, Threats, and Countermeasures

Ransomware: Facts, Threats, and Countermeasures

By: Stacey Wright (Intel Program Manager) & Ben Spear (Senior Cyber Intelligence Analyst) Ransomware Ransomware is a type of malware that has become a significant threat to U.S. businesses and individuals during…

Get to Know the CIS Critical Security Controls

Get to Know the CIS Critical Security Controls

The CIS Critical Security Controls have come a long way since 2008. Check out this infographic below to learn more about the Controls and how you can start using them…

MS-ISAC Members: The Most Valuable MS-ISAC Resource

MS-ISAC Members: The Most Valuable MS-ISAC Resource

By: Jill Fraser, Intelligence & Analysis Working Group Member In becoming an MS-ISAC member, the most valuable resource we receive is access to other MS-ISAC members. While there is unarguably…

2016 Summer Olympics: 3 Ways to Stay Safe Online

2016 Summer Olympics: 3 Ways to Stay Safe Online

Over 70 malicious websites were created during the 2012 Olympics to lure people into buying fake tickets.1 With the 2016 Summer Olympics taking off this week, look out for spam,…

Page 1 of 512345