All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1231 Results Found

Solutions

Industry

961 - 970 of 1231 results
Election Security Spotlight – Top-Level Domains (TLD)
Published on 08.16.2019
What it is: A top-level domain (TLD), or domain suffix, represents the right-most segment of a domain address, specifically the letters immediate...

Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Published on 08.15.2019
Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...
CIS BenchmarksCIS Hardened Images

Learn about CIS Controls Implementation Groups and the Controls Assessment Module
Published on 08.14.2019
This event has already occurred.
Thursday, August 29, 2019 | 2:00 PM, EDT The CIS Controls Implementation Groups (IG) are self-assessed based on your organization’s resources and...
CIS ControlsMS-ISAC

Build Kits Speed Implementation of Secure Configurations
Published on 08.13.2019
Secure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...
CIS BenchmarksCIS SecureSuite

A Day in the Life of an Information Security Senior Auditor
Published on 08.06.2019
Being an Information Security Senior Auditor brings different challenges every day. Whether she’s helping conduct assessments or evaluating risk ...
CIS Controls

Ransomware Impacts and Defense Controls
Published on 07.31.2019
When data is the lifeblood of your organization, ransomware hits like a heart attack. Are you prepared? Ransomware is a type of malware that bloc...
CIS Controls

CIS Critical Security Controls v7.1 and Sub-Controls Mapping to ISO 27001
Published on 07.16.2019
This document provides a detailed mapping of the relationships between CIS Critical Security Controls v7.1 and ISO 27001.
CIS Controls

CIS Inventory Tracking Spreadsheets for v8.1 and v7.1 of the CIS Controls
Published on 07.10.2019
These documents contain examples of methods for tracking hardware, software, and sensitive information in an organization.
CIS Controls

Cyber Hygiene Guidance for Windows 10
Published on 07.10.2019
According to both Net Applications and Stat Counter, all versions of the Microsoft Windows operating systems combined represent well over 50% of ...
CIS Controls

CIS Critical Security Controls v7.1 Microsoft Windows 10 Cyber Hygiene Guide
Published on 07.10.2019
This guide provides detailed information on how to accomplish each of the CIS Sub-Controls within Implementation Group 1 (IG1). This guide builds...
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions