Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
576 Results Found
111 - 120 of 576 results
Published on 03.17.2023
How to Strengthen Your Web Security Your WayCIS has released its Malicious Domain Blocking and Reporting Plus (MDBR+) service to help SLTTs and private hospitals strengthen their web securi...
Published on 03.15.2023
Why Your Organization Needs a Cybersecurity RoadmapTo minimize the risk of a data breach, you need to be strategic and plan out your cybersecurity journey by creating a cybersecurity roadmap.[…]
Published on 03.14.2023
3 Ways We’ve Made the CIS Controls More Automation-FriendlyLooking to the future, the CIS Critical Security Controls team has updated the CIS Controls mappings to over 20 security frameworks. […]
Published on 03.09.2023
TikTok: Influence Ops, Data Practices Threaten U.S. SecurityThe MS-ISAC CTI team assesses that TikTok, the widely popular video-sharing app, poses a risk to users and U.S. security.
Published on 03.07.2023
How the Foundational Assessment Makes Starting or Improving a Cybersecurity Program EasierThe Foundational Assessment is designed to help guide SLTT organizations through the first 12-24 months of developing your cybersecurity program....
Published on 03.07.2023
MS-ISAC: 20 Years as Your Trusted Cyber Defense CommunityIt's the 20th anniversary of our Multi-State Information Sharing and Analysis Center (MS-ISAC). That’s 20 years as your trusted cyber defense com...
Published on 03.06.2023
CIS Benchmarks March 2023 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for March 2023.
Published on 02.28.2023
Separating FUD from Practical for Post-Quantum CryptographyPost-quantum cryptography is still a few years from reaching required system capability levels. But organizations can take steps now to prepare. ...
Published on 02.15.2023
Cyber Insurance Price Increases Highlight Ransomware DefensePersistent cybercrime and industry trends will likely continue to drive increases in prices for cyber insurance. Here's what this means for you.
Published on 02.08.2023
Endpoint Security: The Key to Combatting Sophisticated CTAsEndpoint security is a crucial element of your efforts to mount a proper defense against sophisticated cyber threat actors (CTAs).[…]
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More