All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1218 Results Found
Solutions
Industry
961 - 970 of 1218 results
Published on 06.28.2019
What it is: Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet. ...
Published on 06.27.2019
Internet of Things (IoT) devices aren’t just invading our homes; these smart, connected machines have taken root in the workplace. And they’re he...
CIS Controls
Published on 06.27.2019
Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.
CIS Controls
Published on 06.27.2019
The purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Controls v7.1 in asso...
CIS Controls
Published on 06.21.2019
What it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile acti...
Published on 06.20.2019
The CIS team is heading to Boston, Massachusetts on June 25-26, 2019 for AWS re:Inforce. This inaugural cloud security event will bring together ...
CIS Hardened Images
Published on 06.18.2019
The CIS Benchmarks team is excited to announce the release of our newest browser security recommendations. CIS Google Chrome Benchmark v2.0.0 con...
CIS BenchmarksCIS SecureSuite
Published on 06.14.2019
The CIS team wrapped up a great week at AWS Public Sector Summit in Washington, DC. In addition to spreading the word about CIS at our booth on t...
CIS Hardened Images
Published on 06.13.2019
Thursday, June 13, 2019 | 1:00 pm In cybersecurity, it can be challenging to identify what you should be doing to protect your organization and m...
CIS BenchmarksCIS ControlsCIS SecureSuite
Published on 06.11.2019
Cyber threats target public sector organizations every day. From ransomware attacks to data theft, systems need defense-in-depth best practices a...
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More