Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

582 Results Found
461 - 470 of 582 results
I Joined the EI-ISAC® – Now What?
Published on 06.13.2019
I Joined the EI-ISAC® – Now What?
As an election official, there is always a laundry list of tasks to be completed. You may have checked one off your list by joining the Elections...

Simplifying the Path to Cloud Security Compliance with ATO on AWS
Published on 06.11.2019
Simplifying the Path to Cloud Security Compliance with ATO on AWS
Cyber threats target public sector organizations every day. From ransomware attacks to data theft, systems need defense-in-depth best practices a...

New Benchmark Coverage and CIS Controls™ Feature in CIS-CAT Pro®
Published on 06.04.2019
New Benchmark Coverage and CIS Controls™ Feature in CIS-CAT Pro®
Operating systems, containers, and servers ship with insecure default settings, leaving gaps that cybercriminals can take advantage of. That’s wh...

Improve Your Cloud Security with CIS and AWS at AWS Public Sector Summit 2019
Published on 05.14.2019
Improve Your Cloud Security with CIS and AWS at AWS Public Sector Summit 2019
The CIS team will be heading to Washington, DC on June 11-12 for AWS Public Sector Summit. We’ll be speaking about CIS Benchmarks, CIS Hardened I...

3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
Published on 05.07.2019
3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
For organizations who are conducting their first cyber risk assessment, it can be challenging to know where to start. CIS RAM (Center for Interne...

Election Technology Procurements Guide
Published on 04.30.2019
Election Technology Procurements Guide
A Set of Best Practices for Securing Election Technology through Procurement Computer hardware, software, and other services are essential for el...

A Day in the Life of a Computer Emergency Response Team (CIRT) Manager
Published on 04.23.2019
A Day in the Life of a Computer Emergency Response Team (CIRT) Manager
Helping U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis can be intense, but Val...

V7.1 Introduces Implementation Groups to the CIS Critical Security Controls™
Published on 04.04.2019
V7.1 Introduces Implementation Groups to the CIS Critical Security Controls™
The CIS Critical Security Controls are internationally-recognized cybersecurity best practices for defense against common threats.  They are a co...

6 Reasons it’s Smart to Work in the Cloud
Published on 04.02.2019
6 Reasons it’s Smart to Work in the Cloud
CIS Chief Technology Officer Brian Calkin predicted in our 2019 cybersecurity trends blog that organizations would continue to move to the cloud....

SCAP 2.0, The Time Is Now
Published on 04.01.2019
SCAP 2.0, The Time Is Now
By Curtis Dukes, Executive VP and GM – CIS Security Best Practices Admonitions to try harder and spend more on cybersecurity will not prevent mor...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions