All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1237 Results Found

Solutions

Industry

791 - 800 of 1237 results
Open Source Content Management Systems
Published on 01.19.2021
This event has already occurred.
Previously presented on February 11, 2021 | 3:00 pm EST What Attendees Learned: A discussion of the big three open source Content Management Syst...
MS-ISAC

Transforming Information Security to Secure Businesses
Published on 01.19.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer We are on a path that will see information security transformed in the next 5-10 years. Th...
CIS BenchmarksCIS Controls

20 Years of Creating Confidence in the Connected World
Published on 01.15.2021
In 2020, the Center for Internet Security (CIS) recently celebrated its 20thyear of creating confidence in the connected world. In preparation fo...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services

Election Security Spotlight – Endpoint Detection and Response (EDR)
Published on 01.15.2021
What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...

2021 Cybersecurity Trends to Prepare For
Published on 01.14.2021
While few people foresaw the dramatic developments of the past year, CIS experts interviewed in 2020 identified several cybersecurity trends that...

CIS Build Kits: Implement Secure Configurations More Quickly
Published on 01.12.2021
Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s impor...
CIS BenchmarksCIS SecureSuite

CIS Benchmarks January 2021 Update
Published on 01.06.2021
CIS is excited to announce the release of the following CIS Benchmarks. These CIS Benchmark releases would not have been possible without the tim...
CIS SecureSuite

4 Reasons SLTTs use Network Monitoring Systems
Published on 01.06.2021
Ransomware attacks targeting U.S. State, Local, Tribal, and Territorial government entities (SLTTs) have been on the rise since 2018. It is essen...
CIS Services

Top 10 Malware November 2020
Published on 12.22.2020
In November 2020, the MS-ISAC observed four malware (Dridex, Kovter, Mirai, and Qakbot) return to the Top 10, as well as two new variants (Ngiowe...

Cybersecurity Quarterly Winter 2020
Published on 12.22.2020
The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of the Center for Internet Security, working together to fight c...
CIS BenchmarksCIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions