Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
261 - 270 of 585 results
CIS Benchmarks November 2021 Update
Published on 11.03.2021
CIS Benchmarks November 2021 Update
The following CIS Benchmark updates have been released.  We’ve highlighted the major updates below. Each Benchmark includes a full changelog that...

CIS Risk Assessment Method (RAM) v2.0 for CIS Controls v8
Published on 10.28.2021
CIS Risk Assessment Method (RAM) v2.0 for CIS Controls v8
Risk assessments are valuable tools for understanding the threats enterprises face, allowing them to organize a strategy and build better resilie...

Cyber Hygiene: It’s Not Just Recommended; It’s Essential
Published on 10.25.2021
Cyber Hygiene: It’s Not Just Recommended; It’s Essential
By Tony Sager, Senior VP and Chief Evangelist, CIS The term “cyber hygiene” has been around for at least a couple of decades, and is usually attr...

Guest Podcast: Why is Security Recruiting so Broken?
Published on 10.21.2021
Guest Podcast: Why is Security Recruiting so Broken?
Cybersecurity recruiting challenges: is there truly a lack of applicants, or are employers looking in the wrong places? CIS Senior Vice President...

NGINX + CIS Hardened Images = Security at Top Efficiency
Published on 10.21.2021
NGINX + CIS Hardened Images = Security at Top Efficiency
Just under 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in July 2021, accordi...

Top 10 Malware September 2021
Published on 10.20.2021
Top 10 Malware September 2021
In September 2021, the MS-ISAC observed Jupyter’s return to the Top 10 Malware list. Additionally, ZLoader made its first appearance in the Top 1...

Why Are Authentication and Authorization So Difficult?
Published on 10.18.2021
Why Are Authentication and Authorization So Difficult?
By: Kathleen M. Moriarty, CIS Chief Technology Officer Let’s say you’re tasked with selecting a strong authentication solution for your organizat...

Enabling the Cooperative Cybersecurity Ecosystem
Published on 10.15.2021
Enabling the Cooperative Cybersecurity Ecosystem
By Adam Montville The Center for Internet Security (CIS) has a mission to improve the actual practice of cyber defense, and we do this, in part, ...

Join CIS and MS-ISAC at Virtual 11th Annual Cyber Security Summit
Published on 10.14.2021
Join CIS and MS-ISAC at Virtual 11th Annual Cyber Security Summit
The Center for Internet Security (CIS) and the Multi-State Sharing and Analysis Center (MS-ISAC) are proudly serving as partners for the Virtual ...

Announcing CIS Endpoint Security Services for SLTTs
Published on 10.13.2021
Announcing CIS Endpoint Security Services for SLTTs
U.S. State, Local, Tribal, and Territorial (SLTT) organizations face a stark challenge in mounting a proper cybersecurity defense against malicio...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions