All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1237 Results Found

Solutions

Industry

821 - 830 of 1237 results
Understanding Open Source Anonymizing Tools
Published on 11.13.2020
This event has already occurred.
Previously presented on: December 3, 2020 | 3:00 pm ET During this webinar, attendees were introduced to some of the concepts regarding three maj...
MS-ISAC

Advancing Cloud Security with CIS on AWS
Published on 11.05.2020
Increased demand for remote work capabilities continues throughout 2020. Customer security in the cloud remains an important part of that growth....
CIS BenchmarksCIS Hardened Images

Changes to CIS Benchmark Assessment/Recommendation Scoring
Published on 11.04.2020
With hundreds of recommendations in each CIS Benchmark, automated assessment is the key to faster implementation of secure configuration at scale...
CIS BenchmarksCIS SecureSuite

Top Videoconferencing Attacks and Security Best Practices
Published on 10.26.2020
Videoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technolo...
CIS Benchmarks

CIS Videoconferencing Security Guide
Published on 10.26.2020
Videoconferencing is a great way to connect with co-workers and peers, especially when in-person meetings aren’t possible or feasible. Videoconfe...
CIS BenchmarksCIS Controls

Reduce Security Breaches with 6 Basic & Simple Steps
Published on 10.22.2020
This event has already occurred.
Wednesday, October 28 | 2:00 P.M. EDT   Hosted by Cimcor With an overabundance of best practices related to security, IT personnel often ask, “Wh...

September 2020 Top 10 Malware
Published on 10.20.2020
In September 2020, we had 3 malware return to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Ma...
MS-ISAC

Election Security Spotlight – Secure Web Browsing
Published on 10.17.2020
What it is: Secure web browsing involves the use of tools and techniques to protect users from cyberattacks, malware, or other cybersecurity vuln...

Managing Cyber Threats through Effective Governance
Published on 10.16.2020
A Call to Action for Governors and State Legislatures The Center for Internet Security (CIS), the Center for Technology in Government at the Univ...
MS-ISAC

Cybersecurity Practice(s), Not Perfect(ion)
Published on 10.15.2020
A version of this content first appeared in the TripWire’s “The State of Security“ blog.   The term “best practice” often comes up in tandem with...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions