Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
191 - 200 of 582 results
Published on 07.12.2022
The Conti Leaks: A Case of Cybercrime’s CommercializationVarious operations provide evidence of cybercrime's commercialization. In this article, we'll use the the Conti leaks as our lens.
Published on 07.07.2022
Breaking Down the BlackCat Ransomware OperationThe MS-ISAC has recently seen several BlackCat ransomware attacks targeting SLTT-affiliated organizations. Here's how you can defend yourself goi...
Published on 07.05.2022
CIS Benchmarks July 2022 UpdateThe CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for July 2022.
Published on 06.29.2022
CIS Controls Enterprise Asset Management Policy TemplateTo implement an enterprise asset management process, enterprises can use a policy template based on the CIS Critical Security Controls.
Published on 06.28.2022
How to Build Cybersecurity Compliance with Free CIS ResourcesCybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them.
Published on 06.24.2022
Explore Cloud Security with CIS at AWS re:Inforce 2022CIS Hardened Images can assist with your cloud security. That's one of the messages we're bringing to AWS re:Inforce 2022.
Published on 06.22.2022
Making Time for Ongoing Security Awareness TrainingThe key to emphasizing security awareness training is making the most of what's already available, including CIS's partnership with SANS.
Published on 06.20.2022
Top 10 Malware May 2022The MS-ISAC shares that its top 10 malware lineup for May 2022 remained consistent with the exception of Jupyter's return.
Published on 06.17.2022
Fake Facebook Email Uses Copyrights to Trick EI-ISAC MembersMalicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-the...
Published on 06.15.2022
Why Consider a Career in Cybersecurity?As technology evolves and cybersecurity threats continue to grow, the need for qualified cybersecurity candidates only intensifies.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More