All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1204 Results Found

Solutions

Industry

71 - 80 of 1204 results
Lynx Ransomware Pouncing on Utilities
Published on 12.10.2024
The Lynx ransomware group targeted multiple U.S. facilities in 2024. Here's how your facility can strengthen your defenses against threats like L...

2024 General Election Incident Reporting Wrap-up
Published on 12.10.2024
The CIS CTI team responded to member incident reports and monitored reporting trends around the 2024 General Election. Here's what the team obser...

Active Directory and Group Policy Management Best Practices
Published on 12.09.2024
Need help maintaining an Active Directory environment and implementing Group Policy Management best practices? Download our guide today.
CIS Controls

Cloud Companion Guide for CIS Controls v8.1
Published on 12.09.2024
Interested in applying CIS Controls v8.1 to your cloud environment? Download our guide for practical tips and unique considerations to keep in mi...
CIS Controls

12 CIS Experts' Cybersecurity Predictions for 2025
Published on 12.05.2024
We spoke to a dozen experts at the Center for Internet Security® (CIS®) about their cybersecurity predictions for 2025. Here's what they had to s...
CIS ControlsCIS BenchmarksCIS CyberMarketCIS Services

Episode 112: How SANS Fosters Action on Cybersecurity Trends
Published on 12.03.2024
In episode 112 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager discuss how SANS fosters action on cybersecurity trends with Rob T. L...

Episode 111: Distilling a First Principle of Cybersecurity
Published on 11.26.2024
In episode 111 of Cybersecurity Where You Are, Tony Sager sits down with Rick Howard to discuss a first principle of cybersecurity.

Securing and Scaling Cloud Adoption for SLTT Organizations
Published on 11.26.2024
SLTTs must factor in security and compliance when planning their cloud adoption. Download our joint paper with Google for insight into a practica...
CIS Hardened Images

The Ongoing Evolution of the CIS Critical Security Controls
Published on 11.26.2024
For decades, enterprises around the world have used the CIS Critical Security Controls to grow their cyber defenses. Learn how they continue to e...
CIS Controls

Guide to Implementation Groups (IG): CIS Critical Security Controls v8.1
Published on 11.25.2024
Implementation Groups (IGs) help enterprises to prioritize their implementation of the CIS Controls. Download our guide to efficiently determine ...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions