Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
151 - 160 of 582 results
Published on 10.26.2022
Top 10 Malware September 2022In the MS-ISAC's Top 10 Malware list for September 2022, Arechclient2, RedLine, and Ursnif all made a return to the roundup.
Published on 10.25.2022
Fighting Scary Cyber Threats with Sweet SolutionsLooking to scale your cybersecurity defenses and keep up with evolving cyber threats? If so, you'll need these sweet solutions. […]
Published on 10.24.2022
The MS-ISAC Is Now More Than 14K Members Strong!We're excited to announce that the Multi-State Information Sharing and Analysis Center (MS-ISAC) counts more than 14,000 organizations as members...
Published on 10.18.2022
4 Business Goals You Can Achieve While Scaling CybersecurityThere are at least four business goals that organizations can achieve by scaling their cybersecurity programs through CIS SecureSuite Membership.
Published on 10.17.2022
CIS-CAT Pro is Now Even Better! Here's How We've Improved ItWe're retiring CIS-CAT Pro Dashboard v2.x and releasing CIS-CAT Pro Dashboard v3.x, which will embed CIS-CAT Pro Assessor v4 Service.[…]
Published on 10.12.2022
How CIS Helps Ensure Cybersecurity for the Larger EcosystemHere are four CIS resources in particular that our experts would like to call out for this year's Cybersecurity Awareness Month. […]
Published on 10.11.2022
3 Tools to Help Scale Your Cybersecurity ProgramA CIS SecureSuite Membership comes with three tools that organizations can use to scale their cybersecurity programs over time.
Published on 10.06.2022
A Snapshot of CIS’s Work to Strengthen macOS SecurityThe Center for Internet Security has been hard at work in partnership with Apple to strengthen users' macOS security everywhere.
Published on 10.05.2022
CIS Benchmarks October 2022 UpdateThe CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for October 2022.
Published on 10.03.2022
6 Questions for Building and Scaling a Cybersecurity PlanHere are six essential questions that organizations should continually ask themselves to build and scale an effective, sustainable cybersecurity ...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More