All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

1198 Results Found

Solutions

Industry

121 - 130 of 1198 results
The Chinese Communist Party (CCP): A Quest for Data Control
Published on 08.14.2024
We assess apps owned by the People’s Republic of China (PRC) and the potential threat posed to users. Does the PRC leverage these apps for ...
MS-ISAC

Episode 96: Making Continuous Compliance Actionable for SMBs
Published on 08.13.2024
In episode 96 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager are joined by Tarah Wheeler, CEO of Red Queen Dynamics.

Add Value to Your Bottom Line with CIS SecureSuite
Published on 08.13.2024
This event has already occurred.
In this webinar, we'll explain how a CIS SecureSuite Consulting and Services Membership can support the cybersecurity goals of you and your clien...
CIS SecureSuiteTechnology

Top 10 Malware Q2 2024
Published on 08.09.2024
Both ZPHP and DarkGate made their first appearance in the Top 10 Malware list for Q2 2024. Here's what else the CIS Cyber Threat Intelligence tea...
MS-ISAC

How to Develop a “Reasonable” Cyber Defense Program
Published on 08.07.2024
This event has already occurred.
Looking to meet the standard of "reasonable" cyber defense? Check out this webinar to learn how a CIS SecureSuite Membership can help!
CIS SecureSuite

Episode 95: AI Augmentation and Its Impact on Cyber Defense
Published on 08.06.2024
In episode 95 of Cybersecurity Where You Are, Sean Atkinson and Randy Rose discuss AI augmentation and how it's changing the cyber defense landsc...

CIS Benchmarks August 2024 Update
Published on 08.02.2024
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for August 2024.
CIS Benchmarks

Election Security Spotlight — The Evolution of Phishing
Published on 08.01.2024
In this Election Security Spotlight,we discuss the evolution of phishing.

How to Deter Multidimensional Threats in the Connected World
Published on 07.30.2024
Our National Framework proposes a whole-of-society effort to tackle multidimensional threats in the connected world. Explore our high-level findi...

CIS Controls v8.1 Mapping to HPH CPGs
Published on 07.30.2024
The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8.1 to the HPH CPGs.
CIS Controls

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions