Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
121 - 130 of 585 results
Why Your Organization Needs a Cybersecurity Roadmap
Published on 03.15.2023
Why Your Organization Needs a Cybersecurity Roadmap
To minimize the risk of a data breach, you need to be strategic and plan out your cybersecurity journey by creating a cybersecurity roadmap.[…]

3 Ways We’ve Made the CIS Controls More Automation-Friendly
Published on 03.14.2023
3 Ways We’ve Made the CIS Controls More Automation-Friendly
Looking to the future, the CIS Critical Security Controls team has updated the CIS Controls mappings to over 20 security frameworks. […]

TikTok: Influence Ops, Data Practices Threaten U.S. Security
Published on 03.09.2023
TikTok: Influence Ops, Data Practices Threaten U.S. Security
The MS-ISAC CTI team assesses that TikTok, the widely popular video-sharing app, poses a risk to users and U.S. security.

How the Foundational Assessment Makes Starting or Improving a Cybersecurity Program Easier
Published on 03.07.2023
How the Foundational Assessment Makes Starting or Improving a Cybersecurity Program Easier
The Foundational Assessment is designed to help guide SLTT organizations through the first 12-24 months of developing your cybersecurity program....

MS-ISAC: 20 Years as Your Trusted Cyber Defense Community
Published on 03.07.2023
MS-ISAC: 20 Years as Your Trusted Cyber Defense Community
It's the 20th anniversary of our Multi-State Information Sharing and Analysis Center (MS-ISAC). That’s 20 years as your trusted cyber defense com...

CIS Benchmarks March 2023 Update
Published on 03.06.2023
CIS Benchmarks March 2023 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for March 2023.

Separating FUD from Practical for Post-Quantum Cryptography
Published on 02.28.2023
Separating FUD from Practical for Post-Quantum Cryptography
Post-quantum cryptography is still a few years from reaching required system capability levels. But organizations can take steps now to prepare. ...

Cyber Insurance Price Increases Highlight Ransomware Defense
Published on 02.15.2023
Cyber Insurance Price Increases Highlight Ransomware Defense
Persistent cybercrime and industry trends will likely continue to drive increases in prices for cyber insurance. Here's what this means for you.

Endpoint Security: The Key to Combatting Sophisticated CTAs
Published on 02.08.2023
Endpoint Security: The Key to Combatting Sophisticated CTAs
Endpoint security is a crucial element of your efforts to mount a proper defense against sophisticated cyber threat actors (CTAs).[…]

CIS Benchmarks February 2023 Update
Published on 02.07.2023
CIS Benchmarks February 2023 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for February 2023.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions