All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1207 Results Found

Solutions

Industry

1051 - 1060 of 1207 results
Albert: A Smart Solution for Network Monitoring
Published on 09.11.2018
The world of network monitoring can seem a bit intimidating at first. There are a variety of solutions on the market offering to detect, alert, a...
MS-ISAC

CIS Critical Security Controls V7 Poster
Published on 09.10.2018
CIS Controls V7 is a prioritized set of actions to protect your organization and data from known cyber attack vectors. Learn about the basic, fou...
CIS Controls

Oklahoma City and the CIS Controls
Published on 09.07.2018
Learn how Oklahoma City uses the CIS Controls to address their cybersecurity challenges.
CIS ControlsCIS SecureSuite

Election Security Spotlight – Bots
Published on 09.06.2018
What it is Bots are automated applications or scripts designed to perform repetitive tasks without requiring human input. Overall, bot activity c...
MS-ISAC

CIS RAM and Use with Regulatory Frameworks
Published on 09.04.2018
By Chris Cronin, Partner, HALOCK Security Labs CIS RAM is an information security risk assessment method that helps organizations conduct cyber r...
CIS Controls

Cumulonimbus Clouds Drift…Your Cloud Configuration Shouldn’t
Published on 08.28.2018
Drifting is all good and well for the clouds in the sky, but when it comes to cloud computing, users should look out for configuration drift. A f...
CIS Hardened Images

CommunityForce Uses CIS Hardened Images for its Customers
Published on 08.21.2018
CIS Hardened Images are helping one software and technology firm deliver cloud-based process management solutions to over 300 organizations world...
CIS Hardened ImagesTechnology

How to Manage a Multi-faceted IT Environment
Published on 08.21.2018
By Sean Atkinson, Chief Information Security Officer It has become a common practice to combine management of different technologies into a singl...
CIS Controls

Election Security Spotlight – Black, Gray, & White Hat Hackers
Published on 08.20.2018
What it is The term “hacking” is most commonly used in reference to illegal, malicious, or illicit cyber activity. However, within the informatio...
MS-ISAC

Citizens Property Insurance Corporation Adopts the CIS Controls
Published on 08.15.2018
Learn how the CIS Controls are helping address cybersecurity in policy drafting processes.
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions