Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
321 - 330 of 586 results
Published on 04.26.2021
Avoid Configuration Drift Through Effective MonitoringOnce your organization is secured, you’ll need to ensure that your environment doesn’t stray from its protected state. Configuration drift may be...
Published on 04.22.2021
5 Tips to Harden Your OS On-Prem or in the CloudCloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). Th...
Published on 04.21.2021
Ransomware: The Data Exfiltration and Double Extortion TrendsPart 3 in a series on Malware Overview The Multi-State Information Sharing and Analysis Center’s (MS-ISAC) Cyber Threat Intelligence (CTI) team a...
Published on 04.19.2021
Managing Your Cybersecurity Program for the WinNo matter an organization’s size or complexity, cybersecurity is a team sport. Departments and individuals across the board have a stake in ensur...
Published on 04.15.2021
Remote Attestation Enabling Posture Assessment for Automated GRCBy: Kathleen M. Moriarty, CIS Chief Technology Officer Attestation…simplified! This post explains how attestation can provide system-level reme...
Published on 04.14.2021
Mimikatz: The Finest in Post-ExploitationPart 2 in a series on Malware Overview The MS-ISAC continuously observes attacks using the post-exploitation credential stealing tool Mimikatz. M...
Published on 04.13.2021
Mapping Your Way To Compliance With Cybersecurity FrameworksOrganizations today need to comply with multiple policy, regulatory, and legal security frameworks. Complying with all of these frameworks can be...
Published on 04.08.2021
CIS Hardened VMs on AWS Graviton2: Enhancing EC2 SecurityThe Center for Internet Security (CIS) now offers two CIS Hardened Images, Ubuntu Linux 20.04 and Amazon Linux 2, on AWS Graviton2 processors. Am...
Published on 04.08.2021
CIS Controls Companion Guide Call for ParticipationThe CIS Controls started as a grassroots activity over a decade ago to help enterprises focus on the most fundamental and valuable cybersecurity ...
Published on 04.07.2021
Remediate Insecure Configurations to Improve CybersecurityA data breach can result in catastrophic consequences for any organization. Ensuring that your IT environment is safe from cyber threats can be a...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More