All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1303 Results Found

Solutions

Industry

741 - 750 of 1303 results
Episode 14: The Top 5 Cybersecurity Tips for the Family
Published on 08.31.2021
The Top 5 Cybersecurity Tips for the Family In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO), Sean A...
MS-ISAC

CIS Controls v8 Mapping to HIPAA
Published on 08.31.2021
This page describes the methodology used to map the CIS Critical Security Controls to Health Insurance Portability and Accountability Act of 1996...
CIS ControlsHealthcare

CIS Controls v8 Mapping to AICPA Trust Services Criteria (SOC2)
Published on 08.31.2021
This mapping document demonstrates connections between AICPA Trust Services Criteria (SOC2) and the CIS Critical Security Controls v8.
CIS ControlsFinance

Top 10 Malware July 2021
Published on 08.27.2021
In July 2021, the MS-ISAC observed Agent Tesla and Jupyter’s return to the Top 10. The Top 10 Malware variants comprise 63% of the total malware ...
MS-ISAC

How to Identify an Email Hoax & What to do if You Fall Victim
Published on 08.26.2021
Email hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service ...
MS-ISAC

Episode 13: What’s Important to You in Cybersecurity? A Host Q&A
Published on 08.20.2021
What’s Important to You in Cybersecurity? A Host Q&A In this edition of Cybersecurity Where You Are, CIS Chief Information Security Officer (CISO...

How to Layer Secure Docker Containers with Hardened Images
Published on 08.18.2021
As organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...
CIS BenchmarksCIS Hardened Images

How to Meet STIG Compliance and Achieve OS Security with CIS
Published on 08.12.2021
Organizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...
CIS BenchmarksCIS Hardened Images

CIS Benchmarks August 2021 Update
Published on 08.05.2021
CIS Ubuntu Linux 20.04 LTS STIG Benchmark v1.0.0 This Benchmark offers prescriptive guidance for establishing a secure configuration posture for ...
CIS BenchmarksCIS SecureSuite

CIS SecureSuite helps new CISO rapidly achieve SOC 2 compliance
Published on 08.02.2021
A new CISO used a CIS SecureSuite Membership to quickly and effectively implement security controls in preparation for a SOC 2 audit.
CIS SecureSuiteFinance

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions