All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1218 Results Found
971 - 980 of 1218 results
2018 Year in Review
Published on 06.10.2019
Read how in 2018, CIS demonstrated the importance in its role as an independent, global leader in cybersecurity.
CIS SecureSuite

New Benchmark Coverage and CIS Controls™ Feature in CIS-CAT Pro®
Published on 06.04.2019
Operating systems, containers, and servers ship with insecure default settings, leaving gaps that cybercriminals can take advantage of. That’s wh...
CIS BenchmarksCIS SecureSuite

How CloudCheckr Optimizes for Security With CIS
Published on 05.23.2019
When optimizing cloud environments, CloudCheckr knows that security has to be implemented from the start. That’s why they recommend CIS Hardened ...
CIS BenchmarksCIS Hardened ImagesCIS SecureSuite

Election Security Spotlight – Malware Analysis
Published on 05.20.2019
What it is Malware analysis is the process of examining the attributes or behavior of a particular piece of malware often for the purpose of iden...
MS-ISAC

Improve Your Cloud Security with CIS and AWS at AWS Public Sector Summit 2019
Published on 05.14.2019
The CIS team will be heading to Washington, DC on June 11-12 for AWS Public Sector Summit. We’ll be speaking about CIS Benchmarks, CIS Hardened I...
CIS BenchmarksCIS Hardened Images

Election Security Spotlight – The Surface Web, Dark Web, and Deep Web
Published on 05.10.2019
What it is To most users, the internet is what they experience through their email client and web browser every day, but there are a number of ex...
MS-ISAC

3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
Published on 05.07.2019
For organizations who are conducting their first cyber risk assessment, it can be challenging to know where to start. CIS RAM (Center for Interne...
CIS Controls

Security Event Primer – DNS
Published on 04.30.2019
Overview This security primer provides information on general DNS operations, IDS event types, requirements for investigation, recommendations, a...
MS-ISAC

Election Technology Procurements Guide
Published on 04.30.2019
A Set of Best Practices for Securing Election Technology through Procurement Computer hardware, software, and other services are essential for el...

A Day in the Life of a Computer Emergency Response Team (CIRT) Manager
Published on 04.23.2019
Helping U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis can be intense, but Val...
MS-ISAC

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

See All Solutions