Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
271 - 280 of 586 results
Published on 10.13.2021
Announcing CIS Endpoint Security Services for SLTTsU.S. State, Local, Tribal, and Territorial (SLTT) organizations face a stark challenge in mounting a proper cybersecurity defense against malicio...
Published on 10.07.2021
What’s in a Name? CIS Critical Security ControlsBy Tony Sager, CIS Sr. Vice President and Chief Evangelist The conversation that eventually led to the CIS Critical Security Controls started wit...
Published on 10.06.2021
Enter the Ransomware Arena, Live the Experience, and Discover How You Will React!Contingency plans in cybersecurity are essential when preparing for any incident, whether it is malware infecting an end user’s hard drive or ran...
Published on 10.06.2021
3 Ways to Use CIS Cloud Security Resources on the AWS CloudIt’s obvious that the remote capabilities of the modern day office have transformed permanently. Most organizations will see an increase in hybri...
Published on 10.06.2021
CIS Benchmarks October 2021 UpdateThe following CIS Benchmark updates have been released. We’ve highlighted the major updates below. Each Benchmark includes a full changelog that...
Published on 10.05.2021
October is Cybersecurity Awareness Month: Do Your Part, Be Cyber SmartFor 18 years, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have teamed up to promo...
Published on 10.04.2021
CIS CSAT Pro v1.7: CIS Controls v8 Assessment and MoreThe CIS Controls Self Assessment Tool (CIS CSAT) allows organizations to perform assessments on their implementation of the CIS Critical Security...
Published on 10.01.2021
Top 10 Malware August 2021In August 2021, the MS-ISAC observed Blaknight’s return to the Top 10 Malware along with Hupigon, which made its first appearance in the Top 10. ...
Published on 09.29.2021
CIS Introduces v2.0 of the CIS Community Defense ModelThe Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise...
Published on 09.28.2021
Secure Configurations for Remote Endpoints with CIS-CAT ProCIS-CAT Pro v4 gives you a way to manage the secure configurations of your systems – even when they're located in remote environments.[…]
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More