Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
431 - 440 of 585 results
CIS Benchmarks: March to a Million [Infographic]
Published on 12.17.2019
CIS Benchmarks: March to a Million [Infographic]
We’re thrilled to share that the CIS Benchmarks were downloaded over 1 million times in 2019. The CIS Benchmarks provide security guidance for co...

7 Women in Tech Share Career Advice
Published on 12.12.2019
7 Women in Tech Share Career Advice
Women are a growing powerhouse in the tech industry. As the field diversifies and grows more inclusive over time, CIS is honored to have several ...

New CIS Critical Security Controls Mapping to the NIST CSF in a Standardized Data Format
Published on 12.10.2019
New CIS Critical Security Controls Mapping to the NIST CSF in a Standardized Data Format
In August 2019, a report was released by the National Institute of Standards and Technology (NIST). NIST Interagency Report 8204 is a Cybersecuri...

CIS is a Recipient of the 2019 Founders Award for National Cyber Defense Leadership
Published on 11.21.2019
CIS is a Recipient of the 2019 Founders Award for National Cyber Defense Leadership
By Tony Sager, Senior Vice President and Chief Evangelist I recently returned from Minnesota’s CyberSecurity Summit, where I had the honor of rep...

How to Implement & Assess Your Cyber Hygiene
Published on 11.12.2019
How to Implement & Assess Your Cyber Hygiene
Just like physical hygiene keeps us healthy and protects us from common germs, cyber hygiene is important for protecting your organization from c...

New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and More
Published on 11.05.2019
New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and More
New versions of technologies are released all the time. How can you keep up with the changes and the impact they might have on security? The Cent...

CIS-CAT Pro: Reduced Network Usage and More Linux Coverage
Published on 10.31.2019
CIS-CAT Pro: Reduced Network Usage and More Linux Coverage
By: Maureen Kunac, CIS-CAT Pro Product Owner Our teams work with organizations around the world to understand the challenges they may be facing w...

How You’re Affected by Data Breaches
Published on 10.22.2019
How You’re Affected by Data Breaches
Data breach; it’s something we hear in headlines all the time. Cybercriminals expose the sensitive information organizations obtain from individu...

NGINX + CIS Hardened Images Provide Security at Maximum Efficiency
Published on 10.21.2019
NGINX + CIS Hardened Images Provide Security at Maximum Efficiency
Just over 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in August 2019 (Source...

4 Reasons Waiting to Switch to the Cloud May Cost You
Published on 10.15.2019
4 Reasons Waiting to Switch to the Cloud May Cost You
Do you make decisions to ensure your organization’s environment is not only secure, but also up-to-date with the latest vulnerability patches? Mo...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions