All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1303 Results Found
Solutions
Industry
751 - 760 of 1303 results
Published on 07.30.2021
Cybersecurity and Government: Less Wizardry, More Policy It can appear that cybersecurity practices are being built on the creative wizardry of t...
Published on 07.29.2021
Created by Josiah White, Paras Jha, and Dalton Norman, the Mirai botnet was initially written in C for the bots and Go for the controllers, with ...
MS-ISAC
Published on 07.28.2021
U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technolog...
MS-ISAC
Published on 07.27.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer Zero trust improves the security of IT environments as demonstrated over time by reduced a...
CIS Controls
Published on 07.23.2021
In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of the total...
MS-ISAC
Published on 07.22.2021
The Center for Internet Security (CIS) is excited to be attending the upcoming HIMSS Global Health Conference & Exhibition in Las Vegas! Our cybe...
MS-ISAC
Published on 07.16.2021
Remote Attestation Helps Zero Trust Zero trust is an important information security architectural shift. Cyber breaches have increased in intensi...
Published on 07.13.2021
In May 2021, the CIS-CAT development team delivered CIS-CAT Pro Assessor v4.7.0 with the latest CIS Benchmark automated assessment content. The t...
CIS BenchmarksCIS SecureSuite
Published on 07.12.2021
Previously presented on Tuesday, August 10th | 2:00 pm EDT The risks posed by insider threats are not new. In fact, they’ve represented some of t...
MS-ISAC
Published on 07.09.2021
Previously aired About this Episode Modern CTO Podcast host Joel Beasley invited our own Tony Sager, the SVP and Chief Evangelist at the Center f...
CIS Controls
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More







