Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
585 Results Found
171 - 180 of 585 results
Published on 09.12.2022
Navigating Today’s Security Challenges at InfoSec World 2022CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida.
Published on 09.08.2022
Killnet Group Targeting Ukraine Supporters with DDoS AttacksThe Russian-Ukraine war has motivated APT groups to capitalize on the conflict and take sides. Such is true of Killnet.
Published on 09.06.2022
Surge of QakBot Activity Using Malspam, Malicious XLSB FilesThe MS-ISAC is observing an uptick in SLTT QakBot activity aligned with open-source reporting. Let's examine one of those campaigns.
Published on 09.06.2022
CIS Benchmarks September 2022 UpdateThe CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for September 2022.
Published on 08.25.2022
Advancing Hardened Systems in the AWS CloudCIS and AWS have produced one updated and one new CIS Benchmark to help them secure their AWS Cloud deployments.
Published on 08.23.2022
Software Assurance: Approaching Allowlisting for CodeWhile there has been significant work done on supply chain security, efforts surrounding automated software assurance continue to evolve.
Published on 08.22.2022
Brute Ratel: The New Red Teaming Tool Coopted by CTAsThe CTI team at the MS-ISAC has witnessed cyber threat actors (CTAs) abusing the Brute Ratel adversary simulation software.
Published on 08.19.2022
Bringing Multi-Cloud Security to VMWare Explore 2022CIS is excited to to be sponsoring VMWare Explore 2022 U.S. Learn how we can help secure your multi-cloud strategy.
Published on 08.09.2022
A New Beginning for Election Security JourneysElections offices of any jurisdiction can use our Essential Guide to Election Security to shape their cybersecurity journeys going forward.
Published on 08.09.2022
End-of-Support Software Report ListThe importance of replacing software before its End-of-Support (EOS) is critical. EOS occurs when software updates, patches, and other forms of s...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More