Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
111 - 120 of 582 results
Abusing Scheduled Tasks with Living off the Land Attacks
Published on 04.20.2023
Abusing Scheduled Tasks with Living off the Land Attacks
Living off the Land: Scheduled Tasks provides an overview of how this tool is used, how it's abused, and the CIS Controls can help you defend you...

Review, Revise, Repeat: Snapshot Your Cybersecurity Roadmap
Published on 04.10.2023
Review, Revise, Repeat: Snapshot Your Cybersecurity Roadmap
The last step with your cybersecurity roadmap involves examining the plan you've implemented, revising and streamlining, and starting the process...

CIS Benchmarks April 2023 Update
Published on 04.06.2023
CIS Benchmarks April 2023 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for April 2023.

Hit the Road and Implement Your Cybersecurity Roadmap
Published on 04.03.2023
Hit the Road and Implement Your Cybersecurity Roadmap
When it's time to put your cybersecurity roadmap into action, you might be wondering how to get started. Tony Sager has the answers.

Align to a Framework: Plan a Cybersecurity Roadmap's Route
Published on 03.27.2023
Align to a Framework: Plan a Cybersecurity Roadmap's Route
Once you have an idea of where you are, you can decide where you want to go. A security framework is invaluable for this type of work.

Know Your Needs: Get Packing for Your Cybersecurity Roadmap
Published on 03.20.2023
Know Your Needs: Get Packing for Your Cybersecurity Roadmap
Every roadmap needs a starting point. With a cybersecurity roadmap, the best place to start is for you to know your needs.

How to Strengthen Your Web Security Your Way
Published on 03.17.2023
How to Strengthen Your Web Security Your Way
CIS has released its Malicious Domain Blocking and Reporting Plus (MDBR+) service to help SLTTs and private hospitals strengthen their web securi...

Why Your Organization Needs a Cybersecurity Roadmap
Published on 03.15.2023
Why Your Organization Needs a Cybersecurity Roadmap
To minimize the risk of a data breach, you need to be strategic and plan out your cybersecurity journey by creating a cybersecurity roadmap.[…]

3 Ways We’ve Made the CIS Controls More Automation-Friendly
Published on 03.14.2023
3 Ways We’ve Made the CIS Controls More Automation-Friendly
Looking to the future, the CIS Critical Security Controls team has updated the CIS Controls mappings to over 20 security frameworks. […]

TikTok: Influence Ops, Data Practices Threaten U.S. Security
Published on 03.09.2023
TikTok: Influence Ops, Data Practices Threaten U.S. Security
The MS-ISAC CTI team assesses that TikTok, the widely popular video-sharing app, poses a risk to users and U.S. security.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions