All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1304 Results Found
Solutions
Industry
861 - 870 of 1304 results
Published on 01.15.2021
What it is Endpoint Detection and Response (EDR) is security software that is deployed on workstations and servers, commonly referred to as “endp...
Published on 01.14.2021
While few people foresaw the dramatic developments of the past year, CIS experts interviewed in 2020 identified several cybersecurity trends that...
Published on 01.12.2021
Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s impor...
CIS BenchmarksCIS SecureSuite
Published on 01.06.2021
CIS is excited to announce the release of the following CIS Benchmarks. These CIS Benchmark releases would not have been possible without the tim...
CIS SecureSuite
Published on 01.06.2021
Ransomware attacks targeting U.S. State, Local, Tribal, and Territorial government entities (SLTTs) have been on the rise since 2018. It is essen...
CIS Services
Published on 12.22.2020
In November 2020, the MS-ISAC observed four malware (Dridex, Kovter, Mirai, and Qakbot) return to the Top 10, as well as two new variants (Ngiowe...
Published on 12.22.2020
The Winter 2020 issue of Cybersecurity Quarterly focuses on the 20th Anniversary of the Center for Internet Security, working together to fight c...
CIS BenchmarksCIS Controls
Published on 12.18.2020
What it is Virtual Private Networks (VPNs) encrypt and transmit data allowing a user to securely connect to the internet or access a remote netwo...
Published on 12.17.2020
Organizations with cloud workloads need to protect themselves against a variety of risks. While most organizations focus on security against hack...
CIS Hardened Images
Published on 12.15.2020
With many employees working from home, U.S. State, Local, Tribal, and Territorial (SLTT) government entities have an even greater need for cybers...
CIS CyberMarket
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More








