Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
61 - 70 of 582 results
Published on 10.18.2023
Timely Patching Reduces System CompromisesTimely patching is one of the most important cybersecurity controls preventing system compromise – especially amid growing cyber threats.
Published on 10.17.2023
The CIS Controls: A Way to Meet the NYS OAG Data Safety TipsIn this post, we explain how you can meet some of the data safety recommendations of the NYS OAG using the CIS Controls.
Published on 10.12.2023
What is Cyber Threat Intelligence?The MS- and EI-ISAC Cyber Threat Intelligence team helps support SLTTs' cybersecurity defenses. Here's what we mean when we say "CTI."
Published on 10.12.2023
A Short Guide for Spotting Phishing AttemptsKnowing the common signs of phishing can help you spot suspicious emails and prevent a possible compromise. Here are some examples to sharpen you...
Published on 10.10.2023
The Crucial Role of Cybersecurity for U.S. Election OfficesU.S. election offices can't always afford to buy what they need for effective cybersecurity. Here's how CIS can help.
Published on 10.10.2023
CIS Benchmarks October 2023 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for October 2023.
Published on 10.06.2023
DBIR 2023: SME Cyber Defense Begins with the CIS ControlsVerizon's DBIR 2023 references the CIS Controls throughout as effective mitigation tactics for SMEs to defend against top attack patterns.
Published on 10.04.2023
11 Cyber Defense Tips to Stay Secure at Work and HomeTo uphold your personal responsibility for cybersecurity, here are 11 steps that you can use to strengthen your cyber defense at home and at work...
Published on 10.02.2023
2022 NCSR: SLTTs Excel in Recovery Planning and MitigationThe results of the 2022 Nationwide Cybersecurity Review (NCSR) are out! Learn where SLTTs excelled and struggled in their cybersecurity efforts.
Published on 09.28.2023
Fast-Track Your Implementation of Essential Cyber HygieneOur implementation guide works as a ladder to help you rapidly adopt IG1 of the CIS Controls and achieve essential cyber hygiene.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More