All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

1152 Results Found
31 - 40 of 1152 results
Episode 102: The Sporty Rigor of CIS Controls Accreditation
Published on 09.24.2024
Episode 102: The Sporty Rigor of CIS Controls Accreditation
In episode 102 of Cybersecurity Where You Are, Sean Atkinson and Tony Sager discuss CIS Controls Accreditation with Charity Otwell and Lawrence C...

CIS Controls Community Volunteer Spotlight: Shane Markley
Published on 09.23.2024
CIS Controls Community Volunteer Spotlight: Shane Markley
Members of the CIS Controls Community volunteer their expertise and time for the greater good of cybersecurity. Shane Markley shares how he plays...

Establishing Essential Cyber Hygiene Version 8.1
Published on 09.20.2024
Establishing Essential Cyber Hygiene Version 8.1
Many successful cyber attacks exploit "poor hygiene." Download this guide to drive your implementation of essential cyber hygiene using the CIS C...

Guide to Asset Classes: CIS Critical Security Controls v8.1
Published on 09.19.2024
Guide to Asset Classes: CIS Critical Security Controls v8.1
You need to verify you've accounted for and secured in-scope asset classes on an ongoing basis. Download our guide to learn how CIS Controls v8.1...

DMARC Guide: Microsoft 365 and Google Workspace
Published on 09.18.2024
DMARC Guide: Microsoft 365 and Google Workspace
Setting up DMARC is not a trivial task. Download our guide to learn how to set DMARC up for Microsoft 365 and Google Workplace email.

Episode 101: Visualizing Attack Paths in Active Directory
Published on 09.17.2024
Episode 101: Visualizing Attack Paths in Active Directory
In episode 101 of Cybersecurity Where You Are, Sean Atkinson discusses visualizing attack paths in Active Directory with two guests from SpecterO...

CIS Hardened Images: Reconciling Cloud Security and Services
Published on 09.16.2024
CIS Hardened Images: Reconciling Cloud Security and Services
Don't want cloud security to limit performance or availability? Learn how we've been testing CIS Hardened Images with cloud services to support y...

2024 MS-ISAC Tribal Sector Cybersecurity Report
Published on 09.16.2024
2024 MS-ISAC Tribal Sector Cybersecurity Report
The 2024 MS-ISAC® Tribal Sector Cybersecurity Report provides a comprehensive overview of the cybersecurity landscape for U.S. Tribal or...

8 Security Essentials for Managing Your Online Presence
Published on 09.13.2024
8 Security Essentials for Managing Your Online Presence
Election officials need to manage their online presence to stay safe from cyber threat actors. Here are eight security essentials to help you get...

How to Integrate CSPM into Your Clients’ IaaS Strategy
Published on 09.12.2024
How to Integrate CSPM into Your Clients’ IaaS Strategy
Want to protect your clients against breaches in the cloud? Learn how the CIS Hardened Images can help your clients take a comprehensive approach...

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions