All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter by Topic
1152 Results Found
111 - 120 of 1152 results
Published on 05.21.2024
Reasonable Cybersecurity: On the Need for a Definition"Reasonable cybersecurity" is a phrase that has broad implications across various sectors. But there hasn't been a definition for how to meet it....
Published on 05.17.2024
How Can SLTTs Defend Against Cyber Threats?U.S. SLTTs can use grants to strengthen their defenses against cyber threats. Learn how you can extend the power of your grant dollars in CIS Cyb...
Published on 05.14.2024
Episode 84: Why We Need to Define Reasonable CybersecurityIn episode 84 of Cybersecurity Where You Are, co-host Tony Sager defining reasonable cybersecurity with Brian de Vallance and Phyllis Lee.
Published on 05.13.2024
CIS Controls Volunteer Spotlight: Jackie KrzyzewskiVolunteers who contribute to the CIS Controls come from all backgrounds and with experiences. Hear Jackie Krzyzewski's story.
Published on 05.08.2024
CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8 to MITRE Enterprise ATT&CK ...
Published on 05.07.2024
CIS Benchmarks May 2024 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for May 2024.
Published on 05.07.2024
Election Security Spotlight — Risk ManagementIn this Election Security Spotlight, the EI-ISAC discusses the importance of election offices implementing risk management policies and procedure...
Published on 05.07.2024
CIS Benchmarks Community Volunteer Spotlight: Bruce BadingCIS relies on a global community of IT security professionals to ensure that the CIS Benchmarks provide independent, vendor-agnostic security gui...
Published on 05.07.2024
CIS Controls Volunteer Spotlight: Randy MarchanyRandy Marchany has been a CIS Controls Community member since the beginning. Hear what he's learned in his 24 years of volunteering with CIS.
Published on 05.02.2024
Top 10 Malware Q1 2024The Top 10 Malware in Q1 2024 changed slightly from the previous quarter. Here's what the CIS Cyber Threat Intelligence team observed.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More