All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
Filter by Topic
1087 Results Found
61 - 70 of 1087 results
Published on 02.29.2024
CIS 2023 Year in ReviewIn 2023, CIS increased the size of our team by 100 employees and measurably improved the global state of cybersecurity. Read the full 2023 Year i...
Published on 02.28.2024
The First Steps of Establishing Your Cloud Security StrategyYou've migrated to the cloud, which means it's time to focus on cloud security. Here are some first steps to begin enacting your cloud security s...
Published on 02.27.2024
Episode 77: Data's Value to Decision-Making in CybersecurityIn episode 77 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager using data for decision-making in cybersecurity with Roger Gr...
Published on 02.27.2024
Top 10 Malware Q4 2023The Top 10 Malware in Q4 2023 changed slightly from the previous quarter. Here's what the CIS Cyber Threat Intelligence team observed.
Published on 02.16.2024
Formalizing K-12 Cybersecurity Policies in Less TimeOne school district used CIS SecureSuite® to implement a hardening policy and strengthen their K-12 cybersecurity posture. Read their story.
Published on 02.16.2024
Episode 76: The Role of Thought Leadership in CybersecurityIn episode 76 of Cybersecurity Where You Are, co-host Tony Sager discuss discusses the role of thought leadership in cybersecurity with Julie Mor...
Published on 02.16.2024
Election Security Spotlight - EI-ISAC: Who We Are, What We DoThe EI-ISAC is dedicated to improving the cybersecurity posture of election offices among U.S. SLTTs. Here's how it can help your U.S. SLTT elect...
Published on 02.15.2024
Celebrating Victories: Catching up with the Inaugural Alan Paller Laureate Program AwardeesCIS celebrates the truly awe-inspiring recipients from the 2023 Alan Paller Laureate Program. Check out their stories today.
Published on 02.12.2024
Adoption of CIS Benchmarks™ to Enhance Your Cloud SecurityLooking to enhance your cloud security posture? You can do so using the CIS Benchmarks™. Check out this virtual summit to learn more.
Published on 02.08.2024
CTAs Leveraging Fake Browser Updates in Malware CampaignsCyber threat actors are targeting SLTTs with malware that use fake browser updates and secondary exploitation. The MS-ISAC breaks down this threa...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More