All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

1037 Results Found
1 - 10 of 1037 results
Episode 78: Conductors of Risk Building Harmony in Ambiguity
Published on 03.12.2024
Episode 78: Conductors of Risk Building Harmony in Ambiguity
In episode 78 of Cybersecurity Where You Are, co-hosts Tony Sager and Sean Atkinson discuss harmonizing teams to determine acceptable risk with L...

Election Security Spotlight – Multi-Factor Authentication
Published on 03.12.2024
Election Security Spotlight – Multi-Factor Authentication
In this Election Security Spotlight, the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) discusses multi-factor authen...

CIS Benchmarks March 2024 Update
Published on 03.07.2024
CIS Benchmarks March 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for March 2024.

CIS Controls v8 Mapping to NIST CSF 2.0
Published on 02.29.2024
CIS Controls v8 Mapping to NIST CSF 2.0
The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8 to NIST CSF 2.0.

CIS 2023 Year in Review
Published on 02.29.2024
CIS 2023 Year in Review
In 2023, CIS increased the size of our team by 100 employees and measurably improved the global state of cybersecurity. Read the full 2023 Year i...

The First Steps of Establishing Your Cloud Security Strategy
Published on 02.28.2024
The First Steps of Establishing Your Cloud Security Strategy
You've migrated to the cloud, which means it's time to focus on cloud security. Here are some first steps to begin enacting your cloud security s...

Episode 77: Data's Value to Decision-Making in Cybersecurity
Published on 02.27.2024
Episode 77: Data's Value to Decision-Making in Cybersecurity
In episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager using data for decision-making in cybersecurity with Roger Gr...

Top 10 Malware Q4 2023
Published on 02.27.2024
Top 10 Malware Q4 2023
The Top 10 Malware in Q4 2023 changed slightly from the previous quarter. Here's what the CIS Cyber Threat Intelligence team observed.

Formalizing K-12 Cybersecurity Policies in Less Time
Published on 02.16.2024
Formalizing K-12 Cybersecurity Policies in Less Time
One school district used CIS SecureSuite® to implement a hardening policy and strengthen their K-12 cybersecurity posture. Read their story.

Episode 76: The Role of Thought Leadership in Cybersecurity
Published on 02.16.2024
Episode 76: The Role of Thought Leadership in Cybersecurity
In episode 76 of Cybersecurity Where You Are, co-host Tony Sager discuss discusses the role of thought leadership in cybersecurity with Julie Mor...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions