All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1302 Results Found

Solutions

Industry

711 - 720 of 1302 results
Why Are Authentication and Authorization So Difficult?
Published on 10.18.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer Let’s say you’re tasked with selecting a strong authentication solution for your organizat...

Enabling the Cooperative Cybersecurity Ecosystem
Published on 10.15.2021
By Adam Montville The Center for Internet Security (CIS) has a mission to improve the actual practice of cyber defense, and we do this, in part, ...
CIS BenchmarksCIS Controls

Join CIS and MS-ISAC at Virtual 11th Annual Cyber Security Summit
Published on 10.14.2021
The Center for Internet Security (CIS) and the Multi-State Sharing and Analysis Center (MS-ISAC) are proudly serving as partners for the Virtual ...
MS-ISAC

Episode 17: Cybersecurity Awareness Month, It’s All About the Big Picture
Published on 10.13.2021
In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean Atkinson welcomes Philippe Langlois of the Ve...

Announcing CIS Endpoint Security Services for SLTTs
Published on 10.13.2021
U.S. State, Local, Tribal, and Territorial (SLTT) organizations face a stark challenge in mounting a proper cybersecurity defense against malicio...
CIS ServicesMS-ISAC

Cybersecurity Quarterly Fall 2021
Published on 10.07.2021
The Fall 2021 issue of Cybersecurity Quarterly focuses our new offering for U.S. State, Local, Tribal, and Territorial (SLTT) entities, security ...
CIS CyberMarket

What’s in a Name? CIS Critical Security Controls
Published on 10.07.2021
By Tony Sager, CIS Sr. Vice President and Chief Evangelist The conversation that eventually led to the CIS Critical Security Controls started wit...
CIS Controls

Enter the Ransomware Arena, Live the Experience, and Discover How You Will React!
Published on 10.06.2021
Contingency plans in cybersecurity are essential when preparing for any incident, whether it is malware infecting an end user’s hard drive or ran...
MS-ISAC

3 Ways to Use CIS Cloud Security Resources on the AWS Cloud
Published on 10.06.2021
It’s obvious that the remote capabilities of the modern day office have transformed permanently. Most organizations will see an increase in hybri...
CIS BenchmarksCIS Hardened Images

CIS Benchmarks October 2021 Update
Published on 10.06.2021
The following CIS Benchmark updates have been released.  We’ve highlighted the major updates below. Each Benchmark includes a full changelog that...
CIS BenchmarksCIS SecureSuite

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions