Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

331 - 340 of 493 results
Addressing Configuration Controls within Cybersecurity Frameworks
Published on 05.22.2019
Addressing Configuration Controls within Cybersecurity Frameworks
Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc.

Emotet Wreaks Havoc in Healthcare Systems
Published on 05.14.2019
Emotet Wreaks Havoc in Healthcare Systems
Emotet is one of the most costly and destructive malware. Its worm-like features result in rapid, network-wide infections.

Cyber Convergence Accelerates, But Not Without Challenges
Published on 05.08.2019
Cyber Convergence Accelerates, But Not Without Challenges
Cyber convergence is on the rise, however, so are associated challenges brought about by the very nature of cyber threats.

Flaw in Columbia, S.C., Website Search Tool Exposed Database, SMPT Server Passwords
Published on 04.26.2019
Flaw in Columbia, S.C., Website Search Tool Exposed Database, SMPT Server Passwords
The MS-ISAC brings expertise to local governments facing cybersecurity challenges and security flaws such as exposed server passwords.

CSO Online Highlights CIS Controls as Resource to Achieve GDPR Compliance
Published on 04.23.2019
CSO Online Highlights CIS Controls as Resource to Achieve GDPR Compliance
California uses a checklist of security controls created by CIS to ensure that they are following the state's data security compliance laws.

Managed Vulnerability Management
Published on 04.16.2019
Managed Vulnerability Management
Any strong cybersecurity program should also include a strong and continuous vulnerability management plan. Vulnerability Management goes beyond ...

Cybersecurity Risks Mount as Connectivity of Trucking Fleets Grows
Published on 04.10.2019
Cybersecurity Risks Mount as Connectivity of Trucking Fleets Grows
Connectivity and connected features are changing commercial truck fleet operations.The extensiveness of such connected features increases vulnera...

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events