Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
585 Results Found
371 - 380 of 585 results
Published on 11.16.2020
Top 10 Malware October 2020In October 2020, the MS-ISAC observed two malware (Bolek and NanoCore) return to the Top 10, as well as two new variants (DirectsX and Glupteba) ...
Published on 11.16.2020
CIS Benchmarks November 2020 UpdateThis month brings several new CIS Benchmarks as well as new guidance for teleconferencing. These CIS Benchmark releases would not have been possi...
Published on 11.05.2020
Advancing Cloud Security with CIS on AWSIncreased demand for remote work capabilities continues throughout 2020. Customer security in the cloud remains an important part of that growth....
Published on 11.04.2020
Changes to CIS Benchmark Assessment/Recommendation ScoringWith hundreds of recommendations in each CIS Benchmark, automated assessment is the key to faster implementation of secure configuration at scale...
Published on 10.26.2020
Top Videoconferencing Attacks and Security Best PracticesVideoconferencing has become a routine part of everyday life for remote workers, students, and families. Yet widespread adoption of this technolo...
Published on 10.20.2020
September 2020 Top 10 MalwareIn September 2020, we had 3 malware return to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Ma...
Published on 10.15.2020
Cybersecurity Practice(s), Not Perfect(ion)A version of this content first appeared in the TripWire’s “The State of Security“ blog. The term “best practice” often comes up in tandem with...
Published on 10.14.2020
CIS Benchmarks October 2020 UpdateCIS is excited to announce the release of the following CIS Benchmarks. These CIS Benchmark releases would not have been possible without the tim...
Published on 10.05.2020
CIS CSAT Pro v1.1.0: New Features and Mappings for Assessing CIS Controls ImplementationThe CIS Controls Self Assessment Tool (CIS CSAT) Pro allows organizations to assess their implementation of the CIS Controls, enabling them to tr...
Published on 09.30.2020
Cyber Hygiene Matters, and So Do DefinitionsIn an earlier article, I wrote about the importance of cyber hygiene and offered up a specific definition of basic cyber hygiene based on CIS Con...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More