All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1228 Results Found

Solutions

Industry

511 - 520 of 1228 results
The Conti Leaks: A Case of Cybercrime’s Commercialization
Published on 07.12.2022
Various operations provide evidence of cybercrime's commercialization. In this article, we'll use the the Conti leaks as our lens.
MS-ISAC

Episode 34: A Survey of Hacking in Hollywood
Published on 07.08.2022
In episode 34 of Cybersecurity Where You Are, co-host Sean Atkinson and Chris Elgee survey Hollywood's portrayal of hacking.

Breaking Down the BlackCat Ransomware Operation
Published on 07.07.2022
The MS-ISAC has recently seen several BlackCat ransomware attacks targeting SLTT-affiliated organizations. Here's how you can defend yourself goi...
CIS Controls

Cybersecurity Quarterly Summer 2022
Published on 07.06.2022
The Summer 2022 issue of Cybersecurity Quarterly focuses on assessing risk and preparing for cyber attacks, with articles discussing tips to quic...
CIS CyberMarket

State of GovTech: How the Cloud Supports the Hybrid Government Workforce
Published on 07.06.2022
This event has already occurred.
Previously presented on Wednesday June 15, 2022 | 2:00 p.m. EDT Hosted by GovLoop, and co-sponsored by the Center for Internet Security and Red ...
CIS Services

CIS Benchmarks July 2022 Update
Published on 07.05.2022
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for July 2022.
CIS BenchmarksTechnology

CIS Controls Enterprise Asset Management Policy Template
Published on 06.29.2022
To implement an enterprise asset management process, enterprises can use a policy template based on the CIS Critical Security Controls.
CIS Controls

Enterprise Asset Management Policy Template
Published on 06.29.2022
Using the CIS Critical Security Controls v8 as a starting point, enterprises can create an effective enterprise asset management policy.
CIS Controls

How to Build Cybersecurity Compliance with Free CIS Resources
Published on 06.28.2022
Cybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them.
CIS Controls

Episode 33: The Shift-Left of IoT Security to Vendors
Published on 06.28.2022
Episode 33 of Cybersecurity Where You Are examines the need to secure Internet of Things (IoT) devices at the vendor level.

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions