Enhanced Cybersecurity Services (ECS) is an intrusion prevention and analysis capability that helps U.S.-based companies protect their computer systems against unauthorized access, exploitation, and data exfiltration. ECS works by sharing...
Read moreFCC Small Business Cyber Planner 2.0
Information technology and high-speed Internet service are great enablers of small business success, but with the benefits comes the need to guard against growing cyber threats. In October 2012, the FCC relaunched the Small Biz Cyber Planner 2.0...
Read moreDHS Cyber Infrastructure Survey Tool (C-IST)
The Cyber Infrastructure Survey Tool (C-IST) is an assessment of essential cybersecurity practices in place for critical services within critical infrastructure organizations. C-IST is a structured, interview-based assessment focusing on more...
Read moreNIST Framework For Improving Critical Infrastructure Cybersecurity
Created through collaboration between industry and government, the Framework for Improving Critical Infrastructure Cybersecurity consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The...
Read moreNIST Interagency Report 7621—Small Business Information Security: The Fundamentals
Small businesses are a very important part of the economy and a significant part of the critical U.S. economic and cyber infrastructure. Because larger businesses have been strengthening information security with significant resources...
Read moreNIST Special Publication 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
This document by the National Institute of Standards and Technology (NIST) uses a broad definition of PII in order to identify as many potential PII sources as possible in order to protect this information.
Read moreNIST Special Publication 800-150: Guide To Cyber Threat Information Sharing
This draft guide provides guidelines for establishing, participating in, and maintaining cyber threat information sharing relationships. The publication describes the benefits and challenges of sharing, the importance of building trust, the...
Read moreNIST Special Publication 800-36: Guide To Selecting Information Technology Security Products
The selection of information technology security products is an integral part of the design, development, and maintenance of an infrastructure that ensures confidentiality, integrity, and availability of mission-critical information. NIST Special...
Read moreInfosecurity Magazine
This magazine provides informative cybersecurity information under headings such as Topics, News, Webinars, and Whitepapers. Subscription is free.
Read moreMITRE Publications
MITRE has publications regarding many aspects of cybersecurity and provide tactics, techniques, and procedures to assist ISAOs.
Read moreNational Checklist Program (NCP)
The National Checklist Program (NCP) is the US government repository of publicly available security checklists (or benchmarks) that provide details low level guidance on setting the security configuration of operating systems and applications.
Read moreNational Security Cyber Assistance Program (NSCAP)
The National Security Cyber Assistance Program (NSCAP) explores viable approaches to defend against current cyber threats inherent within the cyber domain.
Read more