All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1303 Results Found

Solutions

Industry

811 - 820 of 1303 results
Ransomware: The Data Exfiltration and Double Extortion Trends
Published on 04.21.2021
Part 3 in a series on Malware Overview The Multi-State Information Sharing and Analysis Center’s (MS-ISAC) Cyber Threat Intelligence (CTI) team a...
MS-ISAC

CIS Controls Version 8 Sneak Peek
Published on 04.21.2021
This event has already occurred.
April 21, 2021 | 11:00 am EDT About this Webinar: Join Tony Sager, CIS Sr. VP and Chief Evangelist, and Phyllis Lee, CIS Sr. Director of Controls...
CIS Controls

Managing Your Cybersecurity Program for the Win
Published on 04.19.2021
No matter an organization’s size or complexity, cybersecurity is a team sport. Departments and individuals across the board have a stake in ensur...
CIS ControlsCIS SecureSuite

Securing Your Cloud Infrastructure with CIS Critical Security Controls v8
Published on 04.19.2021
This event has already occurred.
May 4, 2021 | 10:00 am EDT About this Webinar: You asked and we listened! Based on feedback from users around the world and working in a breadth ...
CIS Controls

Election Security Spotlight – What Is A Vulnerability Disclosure Program?
Published on 04.16.2021
A Vulnerability Disclosure Program (VDP) is a way for an organization to enable outside researchers to test its systems and report vulnerabilitie...

Remote Attestation Enabling Posture Assessment for Automated GRC
Published on 04.15.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer   Attestation…simplified! This post explains how attestation can provide system-level reme...

Mimikatz: The Finest in Post-Exploitation
Published on 04.14.2021
Part 2 in a series on Malware Overview The MS-ISAC continuously observes attacks using the post-exploitation credential stealing tool Mimikatz. M...
MS-ISACCIS SecureSuite

Mapping Your Way To Compliance With Cybersecurity Frameworks
Published on 04.13.2021
Organizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be...
CIS SecureSuite

Episode 5: The Tools of Cyber Defense…an Ongoing, Repetitive Process
Published on 04.09.2021
The Tools of Cyber Defense…an Ongoing, Repetitive Process Part 2 of a 2-part series In this week’s Cybersecurity Where You Are podcast, hosts Ton...
CIS BenchmarksCIS ControlsCIS SecureSuite

CIS Hardened VMs on AWS Graviton2: Enhancing EC2 Security
Published on 04.08.2021
The Center for Internet Security (CIS) now offers two CIS Hardened Images, Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors. Am...
CIS Hardened Images

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions