All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter by Topic
1087 Results Found
21 - 30 of 1087 results
Published on 06.24.2024
Top Hurdles for MSSPs and One Shining SolutionAs one of many MSSPs, you're aware of challenges that make your work difficult. Learn how the CIS Controls Accreditation can help.
Published on 06.24.2024
CIS Critical Security Controls v8.1CIS Controls version 8.1 is an iterative update to version 8.0. Download Controls v8.1 to start improving your organization's cyber defense progr...
Published on 06.20.2024
Election Security Spotlight — DDoS AttacksIn this Election Security Spotlight, the EI-ISAC discusses Distributed Denial of Service attacks, otherwise known as DDoS attacks.
Published on 06.18.2024
Episode 88: The Evolution of the Role of a CISOIn episode 88 of Cybersecurity Where You Are, co-host Sean Atkinson discusses the evolving role of a chief information security officer (CISO).
Published on 06.06.2024
CIS Benchmarks Community Volunteer Spotlight: William FergusonThe CIS Benchmarks Community relies on volunteers to help our secure recommendations keep pace with technological change. Here's how William Ferg...
Published on 06.04.2024
Public Water and Wastewater Sector Face Mounting Cyber ThreatCyber threat actors will likely continue to target U.S. SLTT government-operated water and wastewater systems over the next year. Secure your sys...
Published on 06.04.2024
Episode 87: Marking 11 Years as a Verizon DBIR ContributorIn episode 87 of Cybersecurity Where You Are, Tony Sager and guests celebrate 11 years of CIS contributing to the Verizon DBIR.
Published on 06.03.2024
CIS Controls Community Volunteer Spotlight: Kevin KlingbileVolunteers from around the world contribute their expertise to developing the CIS Controls. Here's how Kevin Klingbile contributes as a Controls ...
Published on 06.03.2024
CIS Benchmarks June 2024 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for June 2024.
Published on 05.30.2024
CIS Benchmarks Community Volunteer Spotlight: Kevin ZhangCIS is proud to count so many of the world's best IT security pros as part of our community of volunteers. Here's how Kevin Zhang does his part.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More