All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter
1303 Results Found
Solutions
Industry
981 - 990 of 1303 results
Published on 02.19.2020
Learn how one cybersecurity consulting organization uses the security best practices of CIS SecureSuite to help clients defend against cyber thre...
CIS BenchmarksCIS SecureSuiteTechnology
Published on 02.15.2020
What it is: Cyber hoax scams are attacks that exploit unsuspecting users to provide valuable information, such as login credentials or money. Att...
Published on 02.10.2020
Recommendations for state and local election offices to invest these funds in cybersecurity initiatives.
Published on 02.03.2020
Since their former life as the SANS Top 20, the CIS Controls have come a long way. The CIS Controls have grown over the years to help provide sec...
CIS Controls
Published on 01.30.2020
Securing the nation’s elections goes beyond the voting machines that are used to cast and tally ballots on Election Day. Electronic poll books, e...
Published on 01.29.2020
A Proposal for Rapid Architecture-Based Election Technology Verification (RABET-V) Securing the nation’s elections goes beyond the voting machine...
CIS Controls
Published on 01.28.2020
To protect against ransomware, you need a holistic, all-hands-on-deck, defense-in-depth approach. Here are some steps to help you get started.
CIS ControlsCIS Services
Published on 01.24.2020
What it is Website defacements are the unauthorized modification of web pages, including the addition, removal, or alteration of existing content...
Published on 01.24.2020
Marion County, Florida Elections uses Albert Network Monitoring as a reliable, affordable, and trusted source for inspecting network traffic.
CIS Services
Published on 01.10.2020
Overview Ryuk is the most prevalent ransomware variant in the state, local, tribal, and territorial (SLTT) government sector. It is the number on...
CIS SecureSuite
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More







