All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1219 Results Found

Solutions

Industry

891 - 900 of 1219 results
How One School District Enhances Cyber Hygiene with the CIS Controls
Published on 03.11.2020
Learn how New Hampshire Hillsboro-Deering School District enhances cyber hygiene by implementing the CIS Controls Implementation Group 1.
CIS ControlsEducation

Prepare for Your Next Cybersecurity Compliance Audit with CIS Resources
Published on 03.09.2020
Reading a list of cybersecurity compliance frameworks is like looking at alphabet soup: NIST CSF, PCI DSS, HIPAA, FISMA, GDPR…the list goes on. I...
CIS BenchmarksCIS ControlsCIS SecureSuite

CIS’s Collaborative Cybersecurity Approach Shines at RSA 2020
Published on 03.06.2020
The annual RSA Conference has become a rite of passage for cybersecurity professionals of all stripes. More than 45,000 people attended this year...
CIS BenchmarksCIS ControlsCIS SecureSuite

Intel Insight: How to Disable Macros
Published on 03.03.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite

Top 10 Malware January 2020
Published on 03.02.2020
Top 10 Malware composition was very consistent with December 2019 with only a few new additions to the list. Of note Nemucod made an appearance i...
MS-ISAC

Intel Insights: How to Restrict Server Message Block
Published on 02.24.2020
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
CIS SecureSuite

How to Choose a Cybersecurity Consultant: What are their Security Best Practices?
Published on 02.19.2020
Learn how one cybersecurity consulting organization uses the security best practices of CIS SecureSuite to help clients defend against cyber thre...
CIS BenchmarksCIS SecureSuiteTechnology

Election Security Spotlight – Common Cyber Hoax Scams
Published on 02.15.2020
What it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...

Technology Recommendations for Federal Election Security Funding
Published on 02.10.2020
Recommendations for state and local election offices to invest these funds in cybersecurity initiatives.

A Day in the Life of a Senior Cybersecurity Engineer
Published on 02.03.2020
Since their former life as the SANS Top 20, the CIS Controls have come a long way. The CIS Controls have grown over the years to help provide sec...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions