All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1240 Results Found
Solutions
Industry
681 - 690 of 1240 results
Published on 08.27.2021
In July 2021, the MS-ISAC observed Agent Tesla and Jupyter’s return to the Top 10. The Top 10 Malware variants comprise 63% of the total malware ...
MS-ISAC
Published on 08.26.2021
Email hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service ...
MS-ISAC
Published on 08.20.2021
What’s Important to You in Cybersecurity? A Host Q&A In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO...
Published on 08.18.2021
As organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...
CIS BenchmarksCIS Hardened Images
Published on 08.12.2021
Organizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...
CIS BenchmarksCIS Hardened Images
Published on 08.05.2021
CIS Ubuntu Linux 20.04 LTS STIG Benchmark v1.0.0 This Benchmark offers prescriptive guidance for establishing a secure configuration posture for ...
CIS BenchmarksCIS SecureSuite
Published on 08.02.2021
A new CISO used a CIS SecureSuite Membership to quickly and effectively implement security controls in preparation for a SOC 2 audit.
CIS SecureSuiteFinance
Published on 07.30.2021
Cybersecurity and Government: Less Wizardry, More Policy It can appear that cybersecurity practices are being built on the creative wizardry of t...
Published on 07.29.2021
Created by Josiah White, Paras Jha, and Dalton Norman, the Mirai botnet was initially written in C for the bots and Go for the controllers, with ...
MS-ISAC
Published on 07.28.2021
U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technolog...
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More