Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
281 - 290 of 582 results
Published on 09.07.2021
Four Reasons to Use Hardened VMs for Your Cloud MigrationEnsuring your organization’s IT environment is not only secure, but also patched regularly, can be challenging. Migrating to the cloud can help a...
Published on 08.27.2021
Top 10 Malware July 2021In July 2021, the MS-ISAC observed Agent Tesla and Jupyter’s return to the Top 10. The Top 10 Malware variants comprise 63% of the total malware ...
Published on 08.26.2021
How to Identify an Email Hoax & What to do if You Fall VictimEmail hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service ...
Published on 08.18.2021
How to Layer Secure Docker Containers with Hardened ImagesAs organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...
Published on 08.12.2021
How to Meet STIG Compliance and Achieve OS Security with CISOrganizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...
Published on 08.05.2021
CIS Benchmarks August 2021 UpdateCIS Ubuntu Linux 20.04 LTS STIG Benchmark v1.0.0 This Benchmark offers prescriptive guidance for establishing a secure configuration posture for ...
Published on 07.29.2021
The Mirai Botnet – Threats and MitigationsCreated by Josiah White, Paras Jha, and Dalton Norman, the Mirai botnet was initially written in C for the bots and Go for the controllers, with ...
Published on 07.28.2021
MDBR Stops Ransomware, Phishing, Malware, and MoreU.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technolog...
Published on 07.27.2021
Prioritizing a Zero Trust Journey Using CIS Controls v8By: Kathleen M. Moriarty, CIS Chief Technology Officer Zero trust improves the security of IT environments as demonstrated over time by reduced a...
Published on 07.23.2021
Top 10 Malware June 2021In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of the total...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More