Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
431 - 440 of 586 results
Published on 01.07.2020
10 Cybersecurity Practices CISOs Should Stop in 2020By Sean Atkinson, Chief Information Security Officer CISOs are often the leaders of the cybersecurity world – keeping a close watch over their or...
Published on 12.17.2019
CIS Benchmarks: March to a Million [Infographic]We’re thrilled to share that the CIS Benchmarks were downloaded over 1 million times in 2019. The CIS Benchmarks provide security guidance for co...
Published on 12.12.2019
7 Women in Tech Share Career AdviceWomen are a growing powerhouse in the tech industry. As the field diversifies and grows more inclusive over time, CIS is honored to have several ...
Published on 12.10.2019
New CIS Critical Security Controls Mapping to the NIST CSF in a Standardized Data FormatIn August 2019, a report was released by the National Institute of Standards and Technology (NIST). NIST Interagency Report 8204 is a Cybersecuri...
Published on 11.21.2019
CIS is a Recipient of the 2019 Founders Award for National Cyber Defense LeadershipBy Tony Sager, Senior Vice President and Chief Evangelist I recently returned from Minnesota’s CyberSecurity Summit, where I had the honor of rep...
Published on 11.12.2019
How to Implement & Assess Your Cyber HygieneJust like physical hygiene keeps us healthy and protects us from common germs, cyber hygiene is important for protecting your organization from c...
Published on 11.05.2019
New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and MoreNew versions of technologies are released all the time. How can you keep up with the changes and the impact they might have on security? The Cent...
Published on 10.31.2019
CIS-CAT Pro: Reduced Network Usage and More Linux CoverageBy: Maureen Kunac, CIS-CAT Pro Product Owner Our teams work with organizations around the world to understand the challenges they may be facing w...
Published on 10.22.2019
How You’re Affected by Data BreachesData breach; it’s something we hear in headlines all the time. Cybercriminals expose the sensitive information organizations obtain from individu...
Published on 10.21.2019
NGINX + CIS Hardened Images Provide Security at Maximum EfficiencyJust over 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in August 2019 (Source...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More