Filter by Topic

229 Results Found
1 - 10 of 229 results
Enhancing Safety in the Connected World — A National Framework for Action
Published on 06.27.2024
Enhancing Safety in the Connected World — A National Framework for Action
As threat actors take advantage of the connected world, we must work together to confront multidimensional threats. Here's how we can get started...

Cybersecurity Quarterly Summer 2024
Published on 06.27.2024
Cybersecurity Quarterly Summer 2024
The Summer 2024 issue of Cybersecurity Quarterly centers around the notion of "reasonable" cybersecurity. Check out our articles today!

A Cyber Defense Guide for the Financial Sector
Published on 06.26.2024
A Cyber Defense Guide for the Financial Sector
The financial industry faces dangerous cyber-attacks every day. From data breaches to monetary theft to protecting tax information, banks, credit...

CIS Controls v8.1 Mapping to NIST CSF 2.0
Published on 06.25.2024
CIS Controls v8.1 Mapping to NIST CSF 2.0
The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8.1 to NIST CSF 2.0.

CIS Critical Security Controls v8.1 Change Log
Published on 06.25.2024
CIS Critical Security Controls v8.1 Change Log
This spreadsheet provides an overview of the changes from CIS Critical Security Controls (CIS Controls) version 8 to version 8.1. See what's chan...

An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms
Published on 06.24.2024
An Examination of How Cyber Threat Actors Can Leverage Generative AI Platforms
To improve your defenses, you must understand how cyber threat actors leverage generative AI platforms. Download our white paper to take a closer...

CIS Critical Security Controls v8.1
Published on 06.24.2024
CIS Critical Security Controls v8.1
CIS Controls version 8.1 is an iterative update to version 8.0. Download Controls v8.1 to start improving your organization's cyber defense progr...

Public Water and Wastewater Sector Face Mounting Cyber Threat
Published on 06.04.2024
Public Water and Wastewater Sector Face Mounting Cyber Threat
Cyber threat actors will likely continue to target U.S. SLTT government-operated water and wastewater systems over the next year. Secure your sys...

How Can SLTTs Defend Against Cyber Threats?
Published on 05.17.2024
How Can SLTTs Defend Against Cyber Threats?
U.S. SLTTs can use grants to strengthen their defenses against cyber threats. Learn how you can extend the power of your grant dollars in CIS Cyb...

Reasonable Cybersecurity Guide
Published on 05.08.2024
Reasonable Cybersecurity Guide
In the United States, there is no specification of what an organization must do to meet reasonable cybersecurity. This guide seeks to do just tha...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions