All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1228 Results Found
Solutions
Industry
71 - 80 of 1228 results
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to the NERC-CIP Standards. Download it now.
CIS Controls
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to the TSA SD Pipeline 2021-02. Download it now.
CIS Controls
Published on 02.05.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 and CIS Safeguards to SOC2. Download it today.
CIS Controls
Published on 02.04.2025
This document contains mappings of the CIS Critical Security Controls® (CIS Controls®) v8.1 to ISACA COBIT 19. Download it now.
CIS Controls
Published on 02.04.2025
In episode 121 of Cybersecurity Where You Are, Sean and Tony discuss the economics of cybersecurity decision-making with Tyler Moore, Ph.D.
Published on 02.04.2025
This document contains mappings of CIS Critical Security Controls (CIS Controls) v8.1 to the Regulation Text (2013) of HIPAA. Download it now.
CIS ControlsHealthcare
Published on 01.31.2025
In Q4 2024, the Top 10 Malware observed by the MS-ISAC® changed slightly from the previous quarter. Here are the malware that topped our list.
MS-ISAC
Published on 01.28.2025
In episode 120 of Cybersecurity Where You Are, Sean Atkinson explores how contextual awareness of GenAI deployment shapes AI governance strategy.
Published on 01.28.2025
In this Election Security Spotlight, a discussion of what an ISAC is.
MS-ISAC
Published on 01.21.2025
In episode 119 of Cybersecurity Where You Are, Sean Atkinson discusses multidimensional threat defense for securing large events with John Cohen.
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More