Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
201 - 210 of 586 results
Published on 06.22.2022
Making Time for Ongoing Security Awareness TrainingThe key to emphasizing security awareness training is making the most of what's already available, including CIS's partnership with SANS.
Published on 06.20.2022
Top 10 Malware May 2022The MS-ISAC shares that its top 10 malware lineup for May 2022 remained consistent with the exception of Jupyter's return.
Published on 06.17.2022
Fake Facebook Email Uses Copyrights to Trick EI-ISAC MembersMalicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-the...
Published on 06.15.2022
Why Consider a Career in Cybersecurity?As technology evolves and cybersecurity threats continue to grow, the need for qualified cybersecurity candidates only intensifies.
Published on 06.07.2022
Top 10 Malware April 2022In April 2022, with the exception for both CryptoWall and RedLine returning to the Top 10, the lineup remained consistent with the previous month...
Published on 06.06.2022
Going to Collision 2022? CIS Will See You There!CIS is excited to sponsor and attend Collision 2022 at Booth E308. The event takes place at the Enercare Centre in Toronto, Canada on June 20-23.
Published on 06.01.2022
CIS Benchmarks June 2022 UpdateThe CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for June 2022.
Published on 05.31.2022
Connecting Cyber Risk to Business RiskCIS worked with 4RS to develop an analysis tool that helps professionals solve the cyber risk to business risk challenge.
Published on 05.25.2022
What SLTTs Should Know About the FREE CIS SecureSuite MembershipCIS has made CIS SecureSuite Membership free to SLTT governments in the United States. Learn how this can help you revamp your organization's cyb...
Published on 05.20.2022
Defining "Reasonable" Security with a Risk Assessment MethodEnterprises can use CIS RAM v2.1 for IG3 to demonstrate that a risk is reasonable upon experiencing a breach.
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More