All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1219 Results Found
Solutions
Industry
911 - 920 of 1219 results
Published on 12.30.2019
Learn how one financial institution uses the cybersecurity best practices included in CIS SecureSuite Membership to bolster their cyber defenses.
CIS BenchmarksCIS SecureSuiteFinance
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 800-53 R4.
CIS Controls
Published on 12.24.2019
This document provides a detailed mapping of the relationships between CIS Controls v7.1 and NIST SP 171 R2.
CIS Controls
Published on 12.19.2019
Overview The MS-ISAC observes specific malware variants consistently reaching The Top 10 Malware list. These specific malware variants have trait...
MS-ISACCIS SecureSuite
Published on 12.18.2019
This summary report describes key findings from the 2018 NCSR.
MS-ISAC
Published on 12.17.2019
We’re thrilled to share that the CIS Benchmarks were downloaded over 1 million times in 2019. The CIS Benchmarks provide security guidance for co...
CIS BenchmarksTechnology
Published on 12.13.2019
What it is A zero-day exploit is a cyber attack that targets a flaw in a system before developers or the public are aware it exists. Zero-day exp...
Published on 12.12.2019
Women are a growing powerhouse in the tech industry. As the field diversifies and grows more inclusive over time, CIS is honored to have several ...
CIS BenchmarksCIS ControlsCIS CyberMarketCIS Hardened ImagesCIS Services
Published on 12.10.2019
In August 2019, a report was released by the National Institute of Standards and Technology (NIST). NIST Interagency Report 8204 is a Cybersecuri...
CIS Controls
Published on 11.25.2019
What it is Disaster recovery plans (DRP) seek to quickly redirect available resources into restoring data and information systems following a dis...
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More