Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
576 Results Found
181 - 190 of 576 results
Published on 07.19.2022
Foundational Security for Your Software Supply ChainWe worked with Aqua Security to develop the CIS Software Supply Chain Security Guide using our CIS Benchmarks consensus process.
Published on 07.18.2022
Introducing the CIS Controls OSCAL RepositoryCIS has created a more machine-friendly version of the CIS Controls Version 8 document by leveraging the OSCAL Framework.
Published on 07.14.2022
CIS-CAT Pro Results Focus on CIS Controls IG1CIS-CAT Pro Assessor now offers a new filter in the HTML report that allows organizations to focus on IG1 recommendations.
Published on 07.13.2022
Top 10 Malware June 2022The Top 10 malware lineup for June 2022 remained consistent with May besides the return of GravityRAT, Mirai, and QakBot.
Published on 07.12.2022
The Conti Leaks: A Case of Cybercrime’s CommercializationVarious operations provide evidence of cybercrime's commercialization. In this article, we'll use the the Conti leaks as our lens.
Published on 07.07.2022
Breaking Down the BlackCat Ransomware OperationThe MS-ISAC has recently seen several BlackCat ransomware attacks targeting SLTT-affiliated organizations. Here's how you can defend yourself goi...
Published on 07.05.2022
CIS Benchmarks July 2022 UpdateThe CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for July 2022.
Published on 06.29.2022
CIS Controls Enterprise Asset Management Policy TemplateTo implement an enterprise asset management process, enterprises can use a policy template based on the CIS Critical Security Controls.
Published on 06.28.2022
How to Build Cybersecurity Compliance with Free CIS ResourcesCybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them.
Published on 06.24.2022
Explore Cloud Security with CIS at AWS re:Inforce 2022CIS Hardened Images can assist with your cloud security. That's one of the messages we're bringing to AWS re:Inforce 2022.
Explore Related Cybersecurity Solutions
![CIS Benchmarks](/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More