Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

615 Results Found

Solutions

Industry

351 - 360 of 615 results
CIS Controls v8 at (Virtual) RSA Conference 2021!
Published on 05.04.2021
The Center for Internet Security (CIS) is excited to be part of RSA Conference 2021 – the world’s leading information security conference and exp...
CIS Controls

Top 10 Malware March 2021
Published on 04.29.2021
In March 2021, the MS-ISAC observed Blaknight and Danabot’s return to the Top 10, while CopperStealer made its first appearance. The Top 10 Malwa...
MS-ISAC

STIG Compliance with CIS AWS Cloud Security Resources
Published on 04.27.2021
Securing your IT infrastructure can be a challenge, especially if you’re working in a regulated environment. Many compliance frameworks like, Def...
CIS Hardened Images

Avoid Configuration Drift Through Effective Monitoring
Published on 04.26.2021
Once your organization is secured, you’ll need to ensure that your environment doesn’t stray from its protected state. Configuration drift may be...
CIS SecureSuite

5 Tips to Harden Your OS On-Prem or in the Cloud
Published on 04.22.2021
Cloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). Th...
CIS Hardened ImagesCIS SecureSuite

Ransomware: The Data Exfiltration and Double Extortion Trends
Published on 04.21.2021
Part 3 in a series on Malware Overview The Multi-State Information Sharing and Analysis Center’s (MS-ISAC) Cyber Threat Intelligence (CTI) team a...
MS-ISAC

Managing Your Cybersecurity Program for the Win
Published on 04.19.2021
No matter an organization’s size or complexity, cybersecurity is a team sport. Departments and individuals across the board have a stake in ensur...
CIS ControlsCIS SecureSuite

Remote Attestation Enabling Posture Assessment for Automated GRC
Published on 04.15.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer   Attestation…simplified! This post explains how attestation can provide system-level reme...

Mimikatz: The Finest in Post-Exploitation
Published on 04.14.2021
Part 2 in a series on Malware Overview The MS-ISAC continuously observes attacks using the post-exploitation credential stealing tool Mimikatz. M...
MS-ISACCIS SecureSuite

Mapping Your Way To Compliance With Cybersecurity Frameworks
Published on 04.13.2021
Organizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be...
CIS SecureSuite

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions