All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1189 Results Found

Solutions

Industry

1 - 10 of 1189 results
 FFIEC CAT Sunset: What You Need to Know
Published on 04.07.2025
How are you preparing for the sunset of the FFIEC CAT? Read on to learn how another framework can guide you through this change.

Episode 129: Embedding Cybersecurity in Project Management
Published on 04.01.2025
Struggling to embed cybersecurity in project management for your organization? Our podcast episode lays out some best practices. Listen now!

Episode 128: How Cryptocurrency Is Used for Financial Fraud
Published on 03.25.2025
Cryptocurrency has many uses in the digital economy, including for financial fraud. Listen to our podcast episode to learn more.

CIS Controls v8.1 Mapping to NCSC Cyber Essentials v3.1
Published on 03.24.2025
This document contains mappings of CIS Critical Security Controls® v8.1 and CIS Safeguards to NCSC Cyber Essentials v3.1. Download it now!
CIS Controls

Securely Migrating to the Cloud: An Overview of Process and Strategy
Published on 03.24.2025
This webinar will cover cloud migration options and teach you how to prioritize cloud security and compliance before you’re even in the cloud usi...
FinanceTechnologyHealthcare

Banking on CIS: Navigating Financial Cybersecurity Compliance and  Security Posture
Published on 03.24.2025
“Banking on CIS: How the Center for Internet Security helps financial Institutions navigate your cybersecurity compliance and improve your securi...
Finance

DeepSeek: A New Player in the Global AI Race
Published on 03.24.2025
CIS analysts break down the rise of DeepSeek, a GenAI model that collects data and introduces security risks for users.

Active Lumma Stealer Campaign Impacting U.S. SLTTs
Published on 03.20.2025
The CIS CTI team spotted a Lumma Stealer campaign where SLTT victims were redirected to malicious webpages delivering fake CAPTCHA verifications.

Episode 127: Visible Ops as a Cybersecurity Foundation
Published on 03.18.2025
What role does Visible Ops play in your organization? This podcast episode explores how it can serve as a cybersecurity foundation. Listen now!

CIS Controls v8.1 Mapping to NZISM v3.8
Published on 03.17.2025
This document contains mappings of CIS Critical Security Controls® (CIS Controls®) v8.1 and CIS Safeguards to NZISM v3.8. Download it now!
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions