All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1220 Results Found

Solutions

Industry

841 - 850 of 1220 results
CIS Password Policy Guide
Published on 07.29.2020
Passwords are ubiquitous in modern society. If you have an account on a computer system, there will likely be at least one password that will nee...
CIS Benchmarks

CIS Password Policy Guide: Passphrases, Monitoring, and More
Published on 07.27.2020
Love them or hate them, but passwords have undeniably been a time-tested and imperfect method for user authentication that can protect organizati...
CIS Benchmarks

The 2020 Verizon Data Breach Investigations Report (DBIR)
Published on 07.22.2020
Thursday, August 6th | 2:00 pm It’s that time of the year again as we’re presented with another Verizon Data Breach Investigations Report. This a...

CIS SecureSuite Membership Digital Overview
Published on 07.20.2020
CIS SecureSuite Membership provides integrated cybersecurity tools and resources to organizations of every size. Your team can automate configura...
CIS BenchmarksCIS SecureSuite

CIS Hardened Images Digital Overview
Published on 07.20.2020
CIS Hardened Images bring the globally recognized security configuration recommendations of the CIS Benchmarks to the cloud. These securely pre-c...
CIS Hardened Images

CIS Digital Overview
Published on 07.20.2020
The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competenc...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services

Top 10 Malware June 2020
Published on 07.20.2020
Top 10 Malware composition was fairly consistent through May 2020, with the exception of Quasar, SocGholish, and Ursnif. Overall, the Top 10 Malw...
MS-ISAC

Election Security Spotlight – Domain Name System (DNS)
Published on 07.17.2020
What it is: The Domain Name System (DNS) converts domain names (ex: www.example[.]com) that users enter into a web browser to Internet Protocol (...

How Nevada Can Spotlight its Leadership in Data Security
Published on 07.17.2020
This event has already occurred.
July 30, 2020 | 10:00 A.M. PST A Nevada statute, which becomes effective on January 1, 2021, will revise state requirements relating to personall...
CIS Controls

Cleaning Up a Definition of Basic Cyber Hygiene
Published on 07.16.2020
In discussions about cyber defense, we often hear the term “cyber hygiene.” The general notion is that a lack of good cyber hygiene is at the hea...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions