Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
161 - 170 of 585 results
A Snapshot of CIS’s Work to Strengthen macOS Security
Published on 10.06.2022
A Snapshot of CIS’s Work to Strengthen macOS Security
The Center for Internet Security has been hard at work in partnership with Apple to strengthen users' macOS security everywhere.

CIS Benchmarks October 2022 Update
Published on 10.05.2022
CIS Benchmarks October 2022 Update
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for October 2022.

6 Questions for Building and Scaling a Cybersecurity Plan
Published on 10.03.2022
6 Questions for Building and Scaling a Cybersecurity Plan
Here are six essential questions that organizations should continually ask themselves to build and scale an effective, sustainable cybersecurity ...

Top 10 Malware August 2022
Published on 09.30.2022
Top 10 Malware August 2022
In MS-ISAC's Top 10 Malware list for August 2022, LingyunNET, RecordBreaker, and TeamSpy first appeared, while SocGholish and Tinba returned.

Cybersecurity at Scale: Piercing the Fog of More
Published on 09.26.2022
Cybersecurity at Scale: Piercing the Fog of More
To pierce the Fog of More, organizations must implement essential cyber hygiene and track their implementation of security best practices.

SATAn Targets Air-Gapped Computers with Data Theft, Spying
Published on 09.22.2022
SATAn Targets Air-Gapped Computers with Data Theft, Spying
Malicious actors can use a "SATAn" attack involving the SATA interface to target air-gapped computers with data theft and extortion.

Three Ways that Security in the Azure Cloud Just Got Simpler
Published on 09.19.2022
Three Ways that Security in the Azure Cloud Just Got Simpler
In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure.

How to Scale Cybersecurity for Your Business
Published on 09.14.2022
How to Scale Cybersecurity for Your Business
To scale their cybersecurity programs, organizations should deploy layered security solutions such as those included in a CIS SecureSuite Members...

ISACs' Possible Role in Software Supply Chain Assurance
Published on 09.14.2022
ISACs' Possible Role in Software Supply Chain Assurance
Currently, there are two main roles that ISACs can serve in the software supply chain assurance process. Let's examine both.

LockBit 3.0 RaaS Gang Incorporates BlackMatter Capabilities
Published on 09.13.2022
LockBit 3.0 RaaS Gang Incorporates BlackMatter Capabilities
The LockBit 3.0 Ransomware as a Service (RaaS) gang has incorporated capabilities of the BlackMatter group into its operations.

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions