Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
441 - 450 of 582 results
Published on 09.30.2019
Beyond the Ballot Box: Securing America’s Supporting Election TechnologyThere is more to America’s election technology than most people know. Most people are familiar with voting systems and voter registration systems...
Published on 09.25.2019
Oracle OpenWorld Recap: Autonomous Computing at the ForefrontThe CIS team was proud to attend Oracle OpenWorld 2019 in San Francisco this past week where we were announced as one of only ten launch partners...
Published on 09.24.2019
A Day in the Life: Product Support Team ManagerSince its founding in 2001, CIS has grown to support a wide range of products and services. These include producing no-cost CIS Benchmark PDFs fo...
Published on 09.17.2019
4 Cyber Defense Tips for Finance Industry CISOsBy Sean Atkinson, Chief Information Security Officer When we think of a sector or industry most prone to cybercriminal activity, the financial se...
Published on 09.10.2019
How Prioritized Security Controls Break Through the Fog of MoreBy Sean Atkinson, Chief Information Security Officer & Stephanie Gass, Information Security Audit and Governance The 80s and 90s may have been th...
Published on 09.03.2019
How DMARC Advances Email SecurityWhile some identity management protocols such as multi-factor authentication have made modern advancements, others – like email authentication – ...
Published on 08.28.2019
Small Offices, Big Security – New Guide for Securing Telework EnvironmentsTelecommuting is more popular than ever, allowing people to work from home or alternative environments away from the traditional office. Accordin...
Published on 08.27.2019
PCI & CIS: Partners in Payment Data SecurityCIS and PCI SSC work together on an ongoing basis to increase payment data security everywhere. Here's a look at how.
Published on 08.15.2019
Developing New Cloud Security Guidelines for Debian Linux 8 & 9Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...
Published on 08.13.2019
Build Kits Speed Implementation of Secure ConfigurationsSecure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More