Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
1 - 10 of 582 results
11 Cyber Defense Tips to Stay Secure at Work and Home
Published on 10.04.2024
11 Cyber Defense Tips to Stay Secure at Work and Home
To uphold your personal responsibility for cybersecurity, here are 11 steps that you can use to strengthen your cyber defense at home and at work...

CIS Benchmarks Community Volunteer Spotlight: Rick Handley
Published on 09.25.2024
CIS Benchmarks Community Volunteer Spotlight: Rick Handley
Learn about CIS Benchmarks Community Volunteer Rick Handley. Handley has been a Community Member for 10 years and has a background in Microsoft 3...

CIS Controls Community Volunteer Spotlight: Shane Markley
Published on 09.23.2024
CIS Controls Community Volunteer Spotlight: Shane Markley
Members of the CIS Controls Community volunteer their expertise and time for the greater good of cybersecurity. Shane Markley shares how he plays...

CIS Hardened Images: Reconciling Cloud Security and Services
Published on 09.16.2024
CIS Hardened Images: Reconciling Cloud Security and Services
Don't want cloud security to limit performance or availability? Learn how we've been testing CIS Hardened Images with cloud services to support y...

8 Security Essentials for Managing Your Online Presence
Published on 09.13.2024
8 Security Essentials for Managing Your Online Presence
Election officials need to manage their online presence to stay safe from cyber threat actors. Here are eight security essentials to help you get...

How to Integrate CSPM into Your Clients’ IaaS Strategy
Published on 09.12.2024
How to Integrate CSPM into Your Clients’ IaaS Strategy
Want to protect your clients against breaches in the cloud? Learn how the CIS Hardened Images can help your clients take a comprehensive approach...

Building a Reasonable Cyber Defense Program
Published on 09.11.2024
Building a Reasonable Cyber Defense Program
Looking to build a reasonable cyber defense program? Here are seven policy elements you can incorporate into your program with the help of CIS Se...

CIS Benchmarks September 2024 Update
Published on 09.10.2024
CIS Benchmarks September 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for September 2024.

The Chinese Communist Party (CCP): A Quest for Data Control
Published on 08.14.2024
The Chinese Communist Party (CCP): A Quest for Data Control
We assess apps owned by the People’s Republic of China (PRC) and the potential threat posed to users. Does the PRC leverage these apps for ...

Top 10 Malware Q2 2024
Published on 08.09.2024
Top 10 Malware Q2 2024
Both ZPHP and DarkGate made their first appearance in the Top 10 Malware list for Q2 2024. Here's what else the CIS Cyber Threat Intelligence tea...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions