Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
321 - 330 of 582 results
Remote Attestation Enabling Posture Assessment for Automated GRC
Published on 04.15.2021
Remote Attestation Enabling Posture Assessment for Automated GRC
By: Kathleen M. Moriarty, CIS Chief Technology Officer   Attestation…simplified! This post explains how attestation can provide system-level reme...

Mimikatz: The Finest in Post-Exploitation
Published on 04.14.2021
Mimikatz: The Finest in Post-Exploitation
Part 2 in a series on Malware Overview The MS-ISAC continuously observes attacks using the post-exploitation credential stealing tool Mimikatz. M...

Mapping Your Way To Compliance With Cybersecurity Frameworks
Published on 04.13.2021
Mapping Your Way To Compliance With Cybersecurity Frameworks
Organizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be...

CIS Hardened VMs on AWS Graviton2: Enhancing EC2 Security
Published on 04.08.2021
CIS Hardened VMs on AWS Graviton2: Enhancing EC2 Security
The Center for Internet Security (CIS) now offers two CIS Hardened Images, Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors. Am...

CIS Controls Companion Guide Call for Participation
Published on 04.08.2021
CIS Controls Companion Guide Call for Participation
The CIS Controls started as a grassroots activity over a decade ago to help enterprises focus on the most fundamental and valuable cybersecurity ...

Remediate Insecure Configurations to Improve Cybersecurity
Published on 04.07.2021
Remediate Insecure Configurations to Improve Cybersecurity
A data breach can result in catastrophic consequences for any organization. Ensuring that your IT environment is safe from cyber threats can be a...

CIS Benchmarks April 2021 Update
Published on 04.06.2021
CIS Benchmarks April 2021 Update
CIS is excited to announce the release of the following CIS Benchmarks for March 2021. These CIS Benchmark releases would not have been possible ...

TrickBot: Not Your Average Hat Trick – A Malware with Multiple Hats
Published on 04.05.2021
TrickBot: Not Your Average Hat Trick – A Malware with Multiple Hats
Part 1 in a series on Malware Summary TrickBot originated as a banking credential theft Trojan, but is now considered a modular malware enterpris...

New CIS AWS Benchmarks Help Secure Cloud Products and Services
Published on 04.02.2021
New CIS AWS Benchmarks Help Secure Cloud Products and Services
Amazon Web Services (AWS) continues to expand with new cloud products and services. The Center for Internet Security (CIS) responded with more re...

CIS Critical Security Controls Version 8 is Coming Spring 2021
Published on 03.25.2021
CIS Critical Security Controls Version 8 is Coming Spring 2021
We strive to keep the CIS Critical Security Controls relevant by updating them based on your feedback, evolving technology, and the ever-changing...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions