Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
441 - 450 of 582 results
Beyond the Ballot Box: Securing America’s Supporting Election Technology
Published on 09.30.2019
Beyond the Ballot Box: Securing America’s Supporting Election Technology
There is more to America’s election technology than most people know. Most people are familiar with voting systems and voter registration systems...

Oracle OpenWorld Recap: Autonomous Computing at the Forefront
Published on 09.25.2019
Oracle OpenWorld Recap: Autonomous Computing at the Forefront
The CIS team was proud to attend Oracle OpenWorld 2019 in San Francisco this past week where we were announced as one of only ten launch partners...

A Day in the Life: Product Support Team Manager
Published on 09.24.2019
A Day in the Life: Product Support Team Manager
Since its founding in 2001, CIS has grown to support a wide range of products and services. These include producing no-cost CIS Benchmark PDFs fo...

4 Cyber Defense Tips for Finance Industry CISOs
Published on 09.17.2019
4 Cyber Defense Tips for Finance Industry CISOs
By Sean Atkinson, Chief Information Security Officer When we think of a sector or industry most prone to cybercriminal activity, the financial se...

How Prioritized Security Controls Break Through the Fog of More
Published on 09.10.2019
How Prioritized Security Controls Break Through the Fog of More
By Sean Atkinson, Chief Information Security Officer & Stephanie Gass, Information Security Audit and Governance The 80s and 90s may have been th...

How DMARC Advances Email Security
Published on 09.03.2019
How DMARC Advances Email Security
While some identity management protocols such as multi-factor authentication have made modern advancements, others – like email authentication – ...

Small Offices, Big Security – New Guide for Securing Telework Environments
Published on 08.28.2019
Small Offices, Big Security – New Guide for Securing Telework Environments
Telecommuting is more popular than ever, allowing people to work from home or alternative environments away from the traditional office. Accordin...

PCI & CIS: Partners in Payment Data Security
Published on 08.27.2019
PCI & CIS: Partners in Payment Data Security
CIS and PCI SSC work together on an ongoing basis to increase payment data security everywhere. Here's a look at how.

Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Published on 08.15.2019
Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...

Build Kits Speed Implementation of Secure Configurations
Published on 08.13.2019
Build Kits Speed Implementation of Secure Configurations
Secure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions