Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
431 - 440 of 582 results
CIS is a Recipient of the 2019 Founders Award for National Cyber Defense Leadership
Published on 11.21.2019
CIS is a Recipient of the 2019 Founders Award for National Cyber Defense Leadership
By Tony Sager, Senior Vice President and Chief Evangelist I recently returned from Minnesota’s CyberSecurity Summit, where I had the honor of rep...

How to Implement & Assess Your Cyber Hygiene
Published on 11.12.2019
How to Implement & Assess Your Cyber Hygiene
Just like physical hygiene keeps us healthy and protects us from common germs, cyber hygiene is important for protecting your organization from c...

New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and More
Published on 11.05.2019
New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and More
New versions of technologies are released all the time. How can you keep up with the changes and the impact they might have on security? The Cent...

CIS-CAT Pro: Reduced Network Usage and More Linux Coverage
Published on 10.31.2019
CIS-CAT Pro: Reduced Network Usage and More Linux Coverage
By: Maureen Kunac, CIS-CAT Pro Product Owner Our teams work with organizations around the world to understand the challenges they may be facing w...

How You’re Affected by Data Breaches
Published on 10.22.2019
How You’re Affected by Data Breaches
Data breach; it’s something we hear in headlines all the time. Cybercriminals expose the sensitive information organizations obtain from individu...

NGINX + CIS Hardened Images Provide Security at Maximum Efficiency
Published on 10.21.2019
NGINX + CIS Hardened Images Provide Security at Maximum Efficiency
Just over 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in August 2019 (Source...

4 Reasons Waiting to Switch to the Cloud May Cost You
Published on 10.15.2019
4 Reasons Waiting to Switch to the Cloud May Cost You
Do you make decisions to ensure your organization’s environment is not only secure, but also up-to-date with the latest vulnerability patches? Mo...

Cybersecurity is a Team Sport
Published on 10.10.2019
Cybersecurity is a Team Sport
Cybersecurity relies on specialists of every kind – CISOs, network systems administrators, cloud experts, and more – to achieve success. It takes...

Smart Cities Need Smarter Security
Published on 10.08.2019
Smart Cities Need Smarter Security
Do you live in a “smart city”? You may be surprised to learn that your local municipality has adopted smart technologies such as Internet of Thin...

6 Cybersecurity Tips to Keep Your Workplace Safe Online
Published on 10.01.2019
6 Cybersecurity Tips to Keep Your Workplace Safe Online
In the office, cybersecurity is everyone’s responsibility. By reminding your employees of these simple online safety best practices, your organiz...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions