All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

1152 Results Found
111 - 120 of 1152 results
Reasonable Cybersecurity: On the Need for a Definition
Published on 05.21.2024
Reasonable Cybersecurity: On the Need for a Definition
"Reasonable cybersecurity" is a phrase that has broad implications across various sectors. But there hasn't been a definition for how to meet it....

How Can SLTTs Defend Against Cyber Threats?
Published on 05.17.2024
How Can SLTTs Defend Against Cyber Threats?
U.S. SLTTs can use grants to strengthen their defenses against cyber threats. Learn how you can extend the power of your grant dollars in CIS Cyb...

Episode 84: Why We Need to Define Reasonable Cybersecurity
Published on 05.14.2024
Episode 84: Why We Need to Define Reasonable Cybersecurity
In episode 84 of Cybersecurity Where You Are, co-host Tony Sager defining reasonable cybersecurity with Brian de Vallance and Phyllis Lee.

CIS Controls Volunteer Spotlight: Jackie Krzyzewski
Published on 05.13.2024
CIS Controls Volunteer Spotlight: Jackie Krzyzewski
Volunteers who contribute to the CIS Controls come from all backgrounds and with experiences. Hear Jackie Krzyzewski's story.

CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82
Published on 05.08.2024
CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82
The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8 to MITRE Enterprise ATT&CK ...

CIS Benchmarks May 2024 Update
Published on 05.07.2024
CIS Benchmarks May 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for May 2024.

Election Security Spotlight — Risk Management
Published on 05.07.2024
Election Security Spotlight — Risk Management
In this Election Security Spotlight, the EI-ISAC discusses the importance of election offices implementing risk management policies and procedure...

CIS Benchmarks Community Volunteer Spotlight: Bruce Bading
Published on 05.07.2024
CIS Benchmarks Community Volunteer Spotlight: Bruce Bading
CIS relies on a global community of IT security professionals to ensure that the CIS Benchmarks provide independent, vendor-agnostic security gui...

CIS Controls Volunteer Spotlight: Randy Marchany
Published on 05.07.2024
CIS Controls Volunteer Spotlight: Randy Marchany
Randy Marchany has been a CIS Controls Community member since the beginning. Hear what he's learned in his 24 years of volunteering with CIS.

Top 10 Malware Q1 2024
Published on 05.02.2024
Top 10 Malware Q1 2024
The Top 10 Malware in Q1 2024 changed slightly from the previous quarter. Here's what the CIS Cyber Threat Intelligence team observed.

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions