Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
111 - 120 of 582 results
Published on 04.20.2023
Abusing Scheduled Tasks with Living off the Land AttacksLiving off the Land: Scheduled Tasks provides an overview of how this tool is used, how it's abused, and the CIS Controls can help you defend you...
Published on 04.10.2023
Review, Revise, Repeat: Snapshot Your Cybersecurity RoadmapThe last step with your cybersecurity roadmap involves examining the plan you've implemented, revising and streamlining, and starting the process...
Published on 04.06.2023
CIS Benchmarks April 2023 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for April 2023.
Published on 04.03.2023
Hit the Road and Implement Your Cybersecurity RoadmapWhen it's time to put your cybersecurity roadmap into action, you might be wondering how to get started. Tony Sager has the answers.
Published on 03.27.2023
Align to a Framework: Plan a Cybersecurity Roadmap's RouteOnce you have an idea of where you are, you can decide where you want to go. A security framework is invaluable for this type of work.
Published on 03.20.2023
Know Your Needs: Get Packing for Your Cybersecurity RoadmapEvery roadmap needs a starting point. With a cybersecurity roadmap, the best place to start is for you to know your needs.
Published on 03.17.2023
How to Strengthen Your Web Security Your WayCIS has released its Malicious Domain Blocking and Reporting Plus (MDBR+) service to help SLTTs and private hospitals strengthen their web securi...
Published on 03.15.2023
Why Your Organization Needs a Cybersecurity RoadmapTo minimize the risk of a data breach, you need to be strategic and plan out your cybersecurity journey by creating a cybersecurity roadmap.[…]
Published on 03.14.2023
3 Ways We’ve Made the CIS Controls More Automation-FriendlyLooking to the future, the CIS Critical Security Controls team has updated the CIS Controls mappings to over 20 security frameworks. […]
Published on 03.09.2023
TikTok: Influence Ops, Data Practices Threaten U.S. SecurityThe MS-ISAC CTI team assesses that TikTok, the widely popular video-sharing app, poses a risk to users and U.S. security.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More