All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1204 Results Found

Solutions

Industry

11 - 20 of 1204 results
CIS Controls v8.1 Mapping to DORA
Published on 04.09.2025
This document contains mappings of CIS Critical Security Controls® DORA — Regulation (EU) 2022/2554. Download it today.
CIS Controls

CIS Controls v8.1 Mapping to CAN/CIOSC 104:2021
Published on 04.09.2025
This document contains mappings of CIS Critical Security Controls® (CIS Controls®) v8.1 to CAN/CIOSC 104:2021. Download it now.
CIS Controls

Episode 130: The Story and Future of CIS Thought Leadership
Published on 04.08.2025
CIS didn't just become a global cybersecurity thought leader. It took 25 years of "serendipity." Hear our story and learn where we're going next!

CIS API Security Guide v1.0.0
Published on 04.08.2025
Produced with FireTail, the CIS API Security Guide v1.0.0 covers security aspects in the key stages of API development. Read it now.
CIS Benchmarks

The Evolving Role of Generative Artificial Intelligence in the Cyber Threat Landscape
Published on 04.08.2025
Cyber threat actors are testing the potential of generative artificial intelligence. Download our report to learn how to defend your U.S. SLTT.

CIS Benchmarks April 2025 Update
Published on 04.08.2025
Here is an overview of the CIS Benchmarks that the Center for Internet Security (CIS) updated or released for April 2025.
CIS Benchmarks

 FFIEC CAT Sunset: What You Need to Know
Published on 04.07.2025
How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change.

Episode 129: Embedding Cybersecurity in Project Management
Published on 04.01.2025
Struggling to embed cybersecurity in project management for your organization? Our podcast episode lays out some best practices. Listen now!

Episode 128: How Cryptocurrency Is Used for Financial Fraud
Published on 03.25.2025
Cryptocurrency has many uses in the digital economy, including for financial fraud. Listen to our podcast episode to learn more.

CIS Controls v8.1 Mapping to NCSC Cyber Essentials v3.1
Published on 03.24.2025
This document contains mappings of CIS Critical Security Controls® v8.1 and CIS Safeguards to NCSC Cyber Essentials v3.1. Download it now!
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions