Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

131 - 140 of 544 results
7 hot cybersecurity trends (and 2 going cold)
Published on 01.19.2022
Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.

Log4j raises cyber risk for public finance entities, Fitch warns
Published on 01.19.2022
Because of the complexity of Log4j, it's hard to translate the scope of the vulnerability to policy decision makers or taxpayers.

The 4 Phases of a Cybersecurity Strategy That Schools Must Implement
Published on 01.19.2022
K–12 schools that don’t have a solid approach to preventing and handling cyber incidents can create one — even if they’re understaffed — using th...

How to Prepare Your School for a Cyberattack with Limited Resources
Published on 01.18.2022
The K–12 IT environment can be overwhelming and short on resources even without a pandemic-driven burst in remote learning and the notable spike ...

Keeping Our Connected World Safer
Published on 01.04.2022
The most important action is applying security patches to your OS and applications on your computers, smart phones, and network devices.

Cybersecurity experts raise awareness over critical online security concern
Published on 12.15.2021
CIS is encouraging everyone to act under the assumption that they are impacted, noting the impact these attacks can have.

Supply Chain in Crisis: How Can IT Shops Weather the Storm?
Published on 12.03.2021
When it comes to technology plans , state and local government IT leaders are feeling the pinch because of global supply chain delays.

Bolstered info-sharing seen as a key to ransomware policy, but roles still to be determined
Published on 10.19.2021
Some policy veterans are raising concern that partnership and collaboration may be taking a backseat to ransomware regulation.

Center for Internet Security expands assistance to state and locals, eyes work with vendors to drive improvements
Published on 10.18.2021
CIS president and CEO John Gilligan and CTO Kathleen Moriarty discuss the group’s current efforts and vision for the future.

Overview of CIS Controls 1-6 and How You Can Implement Them
Published on 10.11.2021
Preventing unauthorized devices from gaining access to your network helps ensure the security of hardware devices and assets.

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events