All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1303 Results Found
Solutions
Industry
741 - 750 of 1303 results
Published on 08.31.2021
The Top 5 Cybersecurity Tips for the Family In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean A...
MS-ISAC
Published on 08.31.2021
This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996...
CIS ControlsHealthcare
Published on 08.31.2021
This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.
CIS ControlsFinance
Published on 08.27.2021
In July 2021, the MS-ISAC observed Agent Tesla and Jupyter’s return to the Top 10. The Top 10 Malware variants comprise 63% of the total malware ...
MS-ISAC
Published on 08.26.2021
Email hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service ...
MS-ISAC
Published on 08.20.2021
What’s Important to You in Cybersecurity? A Host Q&A In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO...
Published on 08.18.2021
As organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...
CIS BenchmarksCIS Hardened Images
Published on 08.12.2021
Organizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...
CIS BenchmarksCIS Hardened Images
Published on 08.05.2021
CIS Ubuntu Linux 20.04 LTS STIG Benchmark v1.0.0 This Benchmark offers prescriptive guidance for establishing a secure configuration posture for ...
CIS BenchmarksCIS SecureSuite
Published on 08.02.2021
A new CISO used a CIS SecureSuite Membership to quickly and effectively implement security controls in preparation for a SOC 2 audit.
CIS SecureSuiteFinance
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More






