All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter by Topic
1152 Results Found
1091 - 1100 of 1152 results
Published on 09.21.2017
More Disclosure should be the Consequence of Exposure: The Equifax DebacleBy: Curt Dukes Executive Vice President, Security Best Practices Automation Group at CIS® Equifax collects and retains large quantities of pers...
Published on 09.12.2017
CIS Critical Security Controls SME Companion Guide for v7.1This guide seeks to empower the owners of small and medium-sized enterprises (SMEs) to help them protect their businesses with a small number of ...
Published on 09.11.2017
Cybersecurity for Small and Medium-Sized Enterprises Using the CIS ControlsSeptember 27, 2017 This webinar seeks to empower owners of small and medium-sized enterprises (SMEs) to protect their businesses with a small num...
Published on 09.11.2017
How CIS-CAT Pro Aligns Your Security Best Practices MappingsCIS-CAT Pro is a configuration assessment tool through which you can assess hardening guidelines that are mapped to security best practices.[…]
Published on 08.01.2017
Python Script for Staying Secure with the Latest CIS AMIsYou already know that CIS Hardened Images help you save time and money on hardware purchasing, software licensing, and maintenance. CIS has now m...
Published on 07.28.2017
2016 Nationwide Cyber Security Review: Summary ReportThis Summary Report describes key findings from the 2016 NCSR.
Published on 07.13.2017
Germany Focused Cybersecurity BriefingTuesday, July 18, 2017 | 11:00 a.m. – 12:00 p.m. ET The Center for Internet Security (CIS), a U.S. based cybersecurity nonprofit, is hosting a cy...
Published on 07.06.2017
CIS Hardened Images Now on Google Cloud PlatformAn increasingly popular computing solution, virtual images (sometimes called virtual machines) help businesses around the world save time and mon...
Published on 06.29.2017
Where Privacy Meets SecurityCIS and New America, a Washington, D.C. based think tank hosted a webinar on June 28, 2017, where cybersecurity experts discussed how organizatio...
Published on 05.17.2017
Technical White Paper – SQL InjectionSQL injections are one of the primary attack vectors responsible for high profile compromises.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More