All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1219 Results Found

Solutions

Industry

881 - 890 of 1219 results
6 Educational Cybersecurity Resources for Kids
Published on 04.03.2020
Kids and teens around the country are staying home and adapting to a new virtual school environment. While the adjustment is fun for a while, the...

CIS Critical Security Controls V7.1 Implementation Groups
Published on 03.31.2020
The CIS Critical Security Controls Implementation Groups take a “horizontal” look across all of the CIS Controls and identify a set of Sub-Contro...
CIS Controls

Cybersecurity Quarterly – Spring 2020
Published on 03.30.2020
The Spring 2020 issue of Cybersecurity Quarterly includes articles highlighting the increase of workplaces going virtual and protecting the 2020 ...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services

CIS Hardened Images Built on Google Cloud’s Shielded VMs
Published on 03.30.2020
Google Cloud announced general availability of its Shielded VMs (virtual machines) at a breakout session during Google Cloud Next ‘19. As a resul...
CIS Hardened Images

Top 10 Malware February 2020
Published on 03.24.2020
Top 10 Malware composition is very consistent with January 2020 with the exception of Ursnif. Nemucod remained, for the second month in a row, in...
MS-ISAC

How CIS Can Help Teleworkers Improve their Cyber Defenses
Published on 03.19.2020
As the COVID-19 pandemic is forcing more and more companies to adjust their work schedules and move to telework environments, CIS remains committ...
CIS ControlsCIS SecureSuite

The First Severe Pandemic of the Information Age
Published on 03.18.2020
This event has already occurred.
Wednesday, March 25, 2020 2:00 pm EDT Chief Information Officers have a unique set of responsibilities in a pandemic. They far exceed the normal ...
MS-ISAC

Compliance that Connects
Published on 03.17.2020
Does your organization struggle to prepare for cybersecurity audits, sometimes juggling multiple requirements? If so, you’re not alone. CIS takes...
CIS BenchmarksCIS ControlsCIS SecureSuite

Election Security Spotlight – Signature-Based vs Anomaly-Based Detection
Published on 03.14.2020
What it is: Signature-based and anomaly-based detections are the two main methods of identifying and alerting on threats. While signature-based d...

5 Network Security Remedies for Telework
Published on 03.12.2020
With the COVID-19 (coronavirus) global pandemic, many employers are recommending additional telework to help keep employees safe and productive. ...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions