Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

596 Results Found

Solutions

Industry

461 - 470 of 596 results
A Day in the Life: Product Support Team Manager
Published on 09.24.2019
Since its founding in 2001, CIS has grown to support a wide range of products and services. These include producing no-cost CIS Benchmark PDFs fo...
CIS BenchmarksCIS SecureSuite

4 Cyber Defense Tips for Finance Industry CISOs
Published on 09.17.2019
By Sean Atkinson, Chief Information Security Officer When we think of a sector or industry most prone to cybercriminal activity, the financial se...
CIS BenchmarksCIS SecureSuiteFinance

How Prioritized Security Controls Break Through the Fog of More
Published on 09.10.2019
By Sean Atkinson, Chief Information Security Officer & Stephanie Gass, Information Security Audit and Governance The 80s and 90s may have been th...
CIS Controls

How DMARC Advances Email Security
Published on 09.03.2019
While some identity management protocols such as multi-factor authentication have made modern advancements, others – like email authentication – ...

Small Offices, Big Security – New Guide for Securing Telework Environments
Published on 08.28.2019
Telecommuting is more popular than ever, allowing people to work from home or alternative environments away from the traditional office. Accordin...
CIS Controls

PCI & CIS: Partners in Payment Data Security
Published on 08.27.2019
CIS and PCI SSC work together on an ongoing basis to increase payment data security everywhere. Here's a look at how.
CIS BenchmarksCIS SecureSuite

Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Published on 08.15.2019
Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...
CIS BenchmarksCIS Hardened Images

Build Kits Speed Implementation of Secure Configurations
Published on 08.13.2019
Secure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...
CIS BenchmarksCIS SecureSuite

A Day in the Life of an Information Security Senior Auditor
Published on 08.06.2019
Being an Information Security Senior Auditor brings different challenges every day. Whether she’s helping conduct assessments or evaluating risk ...
CIS Controls

Ransomware Impacts and Defense Controls
Published on 07.31.2019
When data is the lifeblood of your organization, ransomware hits like a heart attack. Are you prepared? Ransomware is a type of malware that bloc...
CIS Controls

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions