All Insights
Explore security resources, trends and updates, media, podcast episodes, and more
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

1060 Results Found
1 - 10 of 1060 results
2024 DBIR Findings & How the CIS Critical Security Controls Can Help to Mitigate Risk to Your Organization
Published on 05.28.2024
2024 DBIR Findings & How the CIS Critical Security Controls Can Help to Mitigate Risk to Your Organization
This webinar will focus on the way the CIS Controls impact threats seen through incidents in breaches ad discussed in the 2024 Verizon DBIR.

Episode 86: Evangelizing CIS's Message at RSAC 2024
Published on 05.28.2024
Episode 86: Evangelizing CIS's Message at RSAC 2024
In episode 86, Sean Atkinson is live once again from Booth 4319 at RSAC 2024 talking to session presenters, passersby, and fellow CIS team member...

CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara
Published on 05.21.2024
CIS Benchmarks Volunteer Spotlight: Hardeep Mehrotara
CIS volunteers help to develop, review, and maintain our security best practices. Here's how Hardeep Mehrotara plays his part.

Episode 85: Reenergizing Collective Action at RSAC 2024
Published on 05.21.2024
Episode 85: Reenergizing Collective Action at RSAC 2024
In episode 85 of Cybersecurity Where You Are, co-hosts Sean Atkinson and Tony Sager discuss collective action in cybersecurity at RSAC 2024.

Reasonable Cybersecurity: On the Need for a Definition
Published on 05.21.2024
Reasonable Cybersecurity: On the Need for a Definition
"Reasonable cybersecurity" is a phrase that has broad implications across various sectors. But there hasn't been a definition for how to meet it....

How Can SLTTs Defend Against Cyber Threats?
Published on 05.17.2024
How Can SLTTs Defend Against Cyber Threats?
U.S. SLTTs can use grants to strengthen their defenses against cyber threats. Learn how you can extend the power of your grant dollars in CIS Cyb...

Episode 84: Why We Need to Define Reasonable Cybersecurity
Published on 05.14.2024
Episode 84: Why We Need to Define Reasonable Cybersecurity
In episode 84 of Cybersecurity Where You Are, co-host Tony Sager defining reasonable cybersecurity with Brian de Vallance and Phyllis Lee.

CIS Controls Volunteer Spotlight: Jackie Krzyzewski
Published on 05.13.2024
CIS Controls Volunteer Spotlight: Jackie Krzyzewski
Volunteers who contribute to the CIS Controls come from all backgrounds and with experiences. Hear Jackie Krzyzewski's story.

Reasonable Cybersecurity Guide
Published on 05.08.2024
Reasonable Cybersecurity Guide
In the United States, there is no specification of what an organization must do to meet reasonable cybersecurity. This guide seeks to do just tha...

CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82
Published on 05.08.2024
CIS Controls v8 Master Mapping to MITRE Enterprise ATT&CK v82
The Center for Internet Security has released a document that contains mappings of the CIS Controls and Safeguards v8 to MITRE Enterprise ATT&CK ...

Newsletter

Stay Ahead in Cybersecurity with Expert Insights and Recent Releases

Subscribe Now

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions