CIS Insights

Explore trending articles, expert perspectives, real-world applications and more from the best minds in cybersecurity and IT.

CIS Controls Risk Assessment Method

Join our workshop to learn how to use CIS RAM 2.1 to help justify investments for reasonable implementation of IG2.

Register Now

Blog Posts

Keep up-to-date on emerging threats, vulnerabilities and practical advice from cybersecurity experts.

View All Blog Posts
Latest Blog Post09.22.2022SATAn Targets Air-Gapped Computers with Data Theft, SpyingRead Blog Post

Case Studies

See how organizations of all sizes are safeguarding IT systems against emerging threats.

View All Case Studies
Latest Case Study06.10.2022How CIS SecureSuite Drives New Revenue Opportunities for Service ProvidersView Case Study

Cybersecurity Spotlights

Explore our featured cyber threat intelligence articles, new research and advancements.

View All Spotlights
Latest Cybersecurity Spotlight07.22.2022Election Security Spotlight - What are Insider Threats?Read Article


Read our monthly publication on timely and trending topics to improve your organization's cybersecurity.

View All Newsletters
Latest Newsletter09.14.2022Hack the Human: End-User Training and Tips to Combat Social EngineeringRead Newsletter


Join Sean Atkinson and Tony Sager as they discuss trends and threats, and interview industry experts.

View All Podcasts
Latest Episode09.16.2022Episode 39: Cybersecurity at ScaleListen to Episode


Explore demos and roundtable discussions on updates, threats, best practices and more.

View All Webinars
Latest Webinar07.19.2022Secure Healthcare Organizations from Ransomware Attacks with CIS and AWSWatch Webinar


Learn about methodologies and strategies to keep your organization safe and secure.

View All White Papers
Latest Whitepaper08.31.2022CIS Software Supply Chain Security GuideRead Whitepaper