All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1219 Results Found

Solutions

Industry

901 - 910 of 1219 results
New Pilot Project RABET-V Tests Security of Election Technology
Published on 01.30.2020
Securing the nation’s elections goes beyond the voting machines that are used to cast and tally ballots on Election Day. Electronic poll books, e...

How to Improve Election Technology Verification
Published on 01.29.2020
A Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
CIS Controls

Steps to Help Prevent & Limit the Impact of Ransomware
Published on 01.28.2020
To protect against ransomware, you need a holistic, all-hands-on-deck, defense-in-depth approach. Here are some steps to help you get started.
CIS ControlsCIS Services

Election Security Spotlight – Website Defacements
Published on 01.24.2020
What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...

Identifying Suspicious Election Network Activity with Albert
Published on 01.24.2020
Marion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.
CIS Services

Security Primer – Ryuk
Published on 01.10.2020
Overview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
CIS SecureSuite

8 Cyber Thought Leaders Share Security Trends for the New Year
Published on 01.09.2020
Cybersecurity trends shift each year as different attacks take hold and technologies adapt to meet the demands of an evolving, connected world. A...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services

From the Ground Up: How CIS Best Practices Helped Build A Cybersecurity Consulting Agency
Published on 01.08.2020
Learn how one cybersecurity consulting organization uses the CIS SecureSuite Membership resources to help clients defend against cyber threats.
CIS BenchmarksCIS SecureSuiteTechnology

10 Cybersecurity Practices CISOs Should Stop in 2020
Published on 01.07.2020
By Sean Atkinson, Chief Information Security Officer CISOs are often the leaders of the cybersecurity world – keeping a close watch over their or...
CIS BenchmarksCIS ControlsCIS Hardened Images

Intel Insights: How to Secure PowerShell
Published on 12.30.2019
Overview The MS-ISAC observes specific malware variants consistently reaching the Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions