Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
281 - 290 of 585 results
The Role of Service Providers in Transforming Security
Published on 09.17.2021
The Role of Service Providers in Transforming Security
By: Kathleen M. Moriarty, CIS Chief Technology Officer Cyber-attacks are increasing in severity. Cybercriminals now use the supply chain, managem...

Join CIS at AWS Public Sector Summit 2021 in DC
Published on 09.09.2021
Join CIS at AWS Public Sector Summit 2021 in DC
The Center for Internet Security (CIS) is excited to sponsor and attend the Amazon Web Services (AWS) Public Sector Summit at booth 209. This yea...

CIS Controls v8 Internet of Things & Mobile Companion Guides
Published on 09.07.2021
CIS Controls v8 Internet of Things & Mobile Companion Guides
The Center for Internet Security (CIS) launched CIS Controls v8 earlier this year. It was enhanced to keep up with evolving technology (modern sy...

Four Reasons to Use Hardened VMs for Your Cloud Migration
Published on 09.07.2021
Four Reasons to Use Hardened VMs for Your Cloud Migration
Ensuring your organization’s IT environment is not only secure, but also patched regularly, can be challenging. Migrating to the cloud can help a...

Top 10 Malware July 2021
Published on 08.27.2021
Top 10 Malware July 2021
In July 2021, the MS-ISAC observed Agent Tesla and Jupyter’s return to the Top 10. The Top 10 Malware variants comprise 63% of the total malware ...

How to Identify an Email Hoax & What to do if You Fall Victim
Published on 08.26.2021
How to Identify an Email Hoax & What to do if You Fall Victim
Email hoaxes demand money by threatening recipients in various ways. The sender may claim that they will unleash a distributed denial of service ...

How to Layer Secure Docker Containers with Hardened Images
Published on 08.18.2021
How to Layer Secure Docker Containers with Hardened Images
As organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...

How to Meet STIG Compliance and Achieve OS Security with CIS
Published on 08.12.2021
How to Meet STIG Compliance and Achieve OS Security with CIS
Organizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...

CIS Benchmarks August 2021 Update
Published on 08.05.2021
CIS Benchmarks August 2021 Update
CIS Ubuntu Linux 20.04 LTS STIG Benchmark v1.0.0 This Benchmark offers prescriptive guidance for establishing a secure configuration posture for ...

The Mirai Botnet – Threats and Mitigations
Published on 07.29.2021
The Mirai Botnet – Threats and Mitigations
Created by Josiah White, Paras Jha, and Dalton Norman, the Mirai botnet was initially written in C for the bots and Go for the controllers, with ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions