Podcasts
CIS's own Sean Atkinson and Tony Sager host "Cybersecurity Where You Are"
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

149 Results Found

Solutions

Industry

1 - 10 of 149 results
Episode 149: Human Error, AI Missteps, and Other VM Risks
Published on 08.19.2025
Human error...AI missteps...it's a new frontier for virtual machine (VM) risks. Listen to our podcast to learn how to navigate this landscape.

Episode 148: How MDR Helps Shine a Light on Zero-Day Attacks
Published on 08.12.2025
Concerned about your defense against zero-day attacks? Listen to our podcast to learn how a Managed Detection and Response (MDR) tool can help.

Episode 147: Actualizing Threat Intel for Effective Defense
Published on 08.05.2025
Looking to enhance your organization's operational response plans? Listen to our podcast to learn how actualizing threat intel can help.

Episode 146: What Security Looks Like for a Security Company
Published on 07.29.2025
Ever wonder what security looks like for a security company? Listen to explore how security evolved during transition periods at CIS.

Episode 145: 2025 Cybersecurity Predictions H2 Review — Pt 1
Published on 07.22.2025
GenAI, supply chain risk, and more! Listen to hear Sean and Tony begin their mid-year review of our 2025 cybersecurity predictions.

Episode 144: Carrying on the MS-ISAC's Character and Culture
Published on 07.15.2025
The MS-ISAC has launched a new funding model to keep its character and culture going well into the future. Listen to learn more.

Episode 143: Iran's Growing Multidimensional Threat Activity
Published on 07.08.2025
How might Iran respond after the June 2025 U.S. airstrikes on its nuclear facilities? Learn how its multidimensional threat activity is evolving.

Episode 142: SLTTs and Their Nuanced Cybersecurity Needs
Published on 07.01.2025
No two U.S. SLTTs are the same. The same goes for their cybersecurity needs. Listen to learn how CIS supports these differences.

Episode 141: A Human-Centered Take on Password Policies
Published on 06.24.2025
What is the role of password policies in cybersecurity? Listen for a human-centered take on their benefits, drawbacks, and efficacy.

Episode 140: Threat-Informed Travel Safety Tips
Published on 06.17.2025
Planning a trip? Listen to our podcast episode for travel safety tips informed by the evolving multidimensional threat environment.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions
ThreatWA Ads