All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

1152 Results Found
1061 - 1070 of 1152 results
Excellence in the Essentials: Managing Complexity through Foundational Controls
Published on 02.23.2018
Excellence in the Essentials: Managing Complexity through Foundational Controls
Thursday, March 8 | 2:00 pm EST Cybersecurity is a chaotic and complex field. From new threats to evolving compliance requirements to a noisy, cr...

CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available
Published on 02.20.2018
CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available
It is with great enthusiasm we announce the release of the highly anticipated CIS Microsoft Azure Foundations Benchmark v1.0.0.  The development ...

MS-ISAC Security Primer – Typosquatting
Published on 02.16.2018
MS-ISAC Security Primer – Typosquatting
Overview Typosquatting attempts to take advantage of typographical errors (i.e. “typos”) introduced by users when URLs are typed directly into th...

Where Risks Meet Controls
Published on 02.13.2018
Where Risks Meet Controls
By Sean Atkinson, Chief Information Security Officer, CIS Using the CIS Controls to define and identify risk The implementation of the CIS Contro...

How to Create a Data Protection Plan
Published on 02.07.2018
How to Create a Data Protection Plan
By Sean Atkinson, Chief Information Security Officer, CIS With 2018 being the “Year of Data Privacy,” organizations in every sector should focus ...

Global retailer uses the CIS Controls for Vendor Assessments
Published on 02.06.2018
Global retailer uses the CIS Controls for Vendor Assessments
Learn how one retailer developed a six-stage vendor assessment process for assessing vendors based on ISO/IEC 27002:2013 and the CIS Controls.

Olympics-Related Malicious Activity Likely to Impact SLTT Governments
Published on 02.05.2018
Olympics-Related Malicious Activity Likely to Impact SLTT Governments
Malicious cyber threat actors often use high-profile events such as the Olympic Games to do their dirty work.

New York Financial Institutions: There’s a New Certification Due Soon!
Published on 02.05.2018
New York Financial Institutions: There’s a New Certification Due Soon!
Time is running out for financial institutions in New York State to submit their first certification for 23 NYCRR Part 500. New regulation 23 NYC...

Response Planning and the Year of Data Privacy
Published on 01.24.2018
Response Planning and the Year of Data Privacy
By Sean Atkinson, Chief Information Security Officer, CIS Spectre, Meltdown, and response planning As I start my third week here at CIS, we find ...

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions