All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1231 Results Found

Solutions

Industry

971 - 980 of 1231 results
New Features in CIS-CAT Pro v1.1.7 Dashboard
Published on 07.09.2019
CIS SecureSuite® Members are receiving an update to CIS-CAT Pro Dashboard in v1.1.7. CIS-CAT Pro Dashboard is the companion tool to CIS-CAT Pro A...
CIS BenchmarksCIS SecureSuite

Now Enlisting IT Experts: CIS Benchmarks Community Roles
Published on 07.03.2019
Have you ever wanted to be part of a global security community? Want to help develop cybersecurity recommendations for new and emerging technolog...
CIS Benchmarks

CIS Team Highlights from AWS re:Inforce
Published on 07.02.2019
The CIS® team had a great experience at AWS re:Inforce from June 25-26, 2019 in Boston, MA. As AWS’ inaugural security conference, re:Inforce bro...
CIS Hardened ImagesCIS SecureSuite

Election Security Spotlight – Internet Protocol
Published on 06.28.2019
What it is: Internet Protocol (IP) is the communication standard used to uniquely identify systems on a computer network or across the internet. ...

New Release: CIS Controls® Internet of Things Companion Guide
Published on 06.27.2019
Internet of Things (IoT) devices aren’t just invading our homes; these smart, connected machines have taken root in the workplace. And they’re he...
CIS Controls

CIS Controls Internet of Things Companion Guide Mapping Applicability
Published on 06.27.2019
Use this spreadsheet of the CIS Controls Internet of Things Companion Guide as a checklist to track your progress of securing IoT devices.
CIS Controls

CIS Controls v7.1 Internet of Things Companion Guide
Published on 06.27.2019
The purpose of the CIS Controls Internet of Things Community is to develop best practices and guidance for implementing CIS Controls v7.1 in asso...
CIS Controls

Election Security Spotlight – Cyber Threat Actors
Published on 06.21.2019
What it is: A Cyber Threat Actor (CTA) is a participant (person or group) in an action or process that is characterized by malice or hostile acti...

Essential Sessions at AWS re:Inforce to Strengthen Your Cloud Security
Published on 06.20.2019
The CIS team is heading to Boston, Massachusetts on June 25-26, 2019 for AWS re:Inforce. This inaugural cloud security event will bring together ...
CIS Hardened Images

CIS Benchmark v2.0.0 for Google Chrome Provides Updated Security Recommendations
Published on 06.18.2019
The CIS Benchmarks team is excited to announce the release of our newest browser security recommendations. CIS Google Chrome Benchmark v2.0.0 con...
CIS BenchmarksCIS SecureSuite

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions