Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
401 - 410 of 582 results
Published on 06.22.2020
CIS Critical Security Controls Self Assessment Tool (CSAT) Update v1.3.0At CIS, we believe in cultivating a trusted and collaborative environment for information sharing. Through our Community, we develop industry-lea...
Published on 06.12.2020
Top 10 Malware May 2020Top 10 Malware composition was fairly consistent with April 2020 with the exception of Modi, Mirai, and NSPPS. Overall, the Top 10 Malware varian...
Published on 06.09.2020
Shared Responsibility for Cloud Security: What You Need to KnowThe COVID-19 pandemic changed business practices worldwide. The traditional workplace transformed; for many, the “new norm” is now a home office ...
Published on 05.21.2020
Verizon DBIR: Ransomware and the Public SectorVerizon’s Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches. The information and analy...
Published on 05.19.2020
2020 Verizon DBIR Includes CIS Data and MappingsThe thirteenth Verizon Data Breach Investigations Report (DBIR) was released on May 19, 2020. Verizon may be most well-known for their leadership...
Published on 05.15.2020
Top 10 Malware April 2020Top 10 Malware composition was fairly consistent with March 2020 with the exception of Bolek and Brambul. Overall, the Top 10 Malware variants co...
Published on 05.11.2020
CIS Benchmarks April 2020 UpdateCIS Oracle Database 12c Benchmark v3.0.0 This CIS Benchmark was released with the following improvements: Guidance was added to existing and new ...
Published on 05.06.2020
CIS Benchmarks End of Life for Unsupported TechnologiesIn addition to being costly and troublesome, the continued use of unsupported technologies can expose your organization to security risks. Patchi...
Published on 04.30.2020
CIS Controls Volunteer Spotlight: Giacomo LunardonThe CIS Controls offer prioritized and prescriptive guidance on how to achieve an effective cybersecurity program. They are developed through a c...
Published on 04.28.2020
Automating the Generation of Windows Vulnerability Detection ContentWith a plethora of cybersecurity threats on the horizon, it’s important that professionals have a common language for discussion and analysis. Op...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More