Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
630 Results Found
Solutions
Industry
371 - 380 of 630 results
Published on 04.21.2021
Part 3 in a series on Malware Overview The Multi-State Information Sharing and Analysis Center’s (MS-ISAC) Cyber Threat Intelligence (CTI) team a...
MS-ISAC
Published on 04.19.2021
No matter an organization’s size or complexity, cybersecurity is a team sport. Departments and individuals across the board have a stake in ensur...
CIS ControlsCIS SecureSuite
Published on 04.15.2021
By: Kathleen M. Moriarty, CIS Chief Technology Officer Attestation…simplified! This post explains how attestation can provide system-level reme...
Published on 04.14.2021
Part 2 in a series on Malware Overview The MS-ISAC continuously observes attacks using the post-exploitation credential stealing tool Mimikatz. M...
MS-ISACCIS SecureSuite
Published on 04.13.2021
Organizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be...
CIS SecureSuite
Published on 04.08.2021
The Center for Internet Security (CIS) now offers two CIS Hardened Images, Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors. Am...
CIS Hardened Images
Published on 04.08.2021
The CIS Controls started as a grassroots activity over a decade ago to help enterprises focus on the most fundamental and valuable cybersecurity ...
CIS Controls
Published on 04.07.2021
A data breach can result in catastrophic consequences for any organization. Ensuring that your IT environment is safe from cyber threats can be a...
CIS SecureSuite
Published on 04.06.2021
CIS is excited to announce the release of the following CIS Benchmarks for March 2021. These CIS Benchmark releases would not have been possible ...
CIS BenchmarksCIS SecureSuite
Published on 04.05.2021
Part 1 in a series on Malware Summary TrickBot originated as a banking credential theft Trojan, but is now considered a modular malware enterpris...
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More








