Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
291 - 300 of 586 results
Published on 07.29.2021
The Mirai Botnet – Threats and MitigationsCreated by Josiah White, Paras Jha, and Dalton Norman, the Mirai botnet was initially written in C for the bots and Go for the controllers, with ...
Published on 07.28.2021
MDBR Stops Ransomware, Phishing, Malware, and MoreU.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technolog...
Published on 07.27.2021
Prioritizing a Zero Trust Journey Using CIS Controls v8By: Kathleen M. Moriarty, CIS Chief Technology Officer Zero trust improves the security of IT environments as demonstrated over time by reduced a...
Published on 07.23.2021
Top 10 Malware June 2021In June 2021, the MS-ISAC observed BitCoin Miner, Mirai, and Ursnif’s return to the Top 10. The Top 10 Malware variants comprise 62% of the total...
Published on 07.22.2021
CIS at the HIMSS Global Health Conference Aug 9-13!The Center for Internet Security (CIS) is excited to be attending the upcoming HIMSS Global Health Conference & Exhibition in Las Vegas! Our cybe...
Published on 07.13.2021
CIS-CAT Pro Dashboard Views of Configuration Data in v2.2.0In May 2021, the CIS-CAT development team delivered CIS-CAT Pro Assessor v4.7.0 with the latest CIS Benchmark automated assessment content. The t...
Published on 07.08.2021
New Hardened VMs from CIS: Graviton2 & Windows 2019 STIGThe Center for Internet Security (CIS) has released three new CIS Hardened Images. CIS built two of these new hardened virtual machines (VMs) on ...
Published on 07.07.2021
CIS Benchmarks July 2021 UpdateThis month’s list may be short, but it is mighty! These CIS Benchmark releases would not have been possible without the time and support of commu...
Published on 07.01.2021
The CIS Benchmarks Community Consensus ProcessThe Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security g...
Published on 06.29.2021
Day One Exploits: How to Effectively Reduce the ThreatCyber hygiene and patching are key measures towards protecting data and systems. However, it’s not always possible or practical to patch when vul...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More