Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
624 Results Found
Solutions
Industry
441 - 450 of 624 results
Published on 07.27.2020
Love them or hate them, but passwords have undeniably been a time-tested and imperfect method for user authentication that can protect organizati...
CIS Benchmarks
Published on 07.20.2020
Top 10 Malware composition was fairly consistent through May 2020, with the exception of Quasar, SocGholish, and Ursnif. Overall, the Top 10 Malw...
MS-ISAC
Published on 07.16.2020
In discussions about cyber defense, we often hear the term “cyber hygiene.” The general notion is that a lack of good cyber hygiene is at the hea...
CIS Controls
Published on 07.07.2020
In these unprecedented times, CISOs face many hurdles in securing virtual office environments. Indeed, in some organizations, virtual environment...
CIS Controls
Published on 07.06.2020
CIS Check Point Firewall Benchmark v1.1.0 Prescriptive guidance for Check Point Firewall, provides prescriptive guidance for establishing a secur...
CIS BenchmarksTechnology
Published on 06.30.2020
Analyzing security configuration assessment results is paramount to remediation planning efforts. The latest update to CIS-CAT Pro Assessor inclu...
CIS BenchmarksCIS SecureSuite
Published on 06.22.2020
At CIS, we believe in cultivating a trusted and collaborative environment for information sharing. Through our Community, we develop industry-lea...
CIS ControlsTechnology
Published on 06.12.2020
Top 10 Malware composition was fairly consistent with April 2020 with the exception of Modi, Mirai, and NSPPS. Overall, the Top 10 Malware varian...
MS-ISAC
Published on 06.09.2020
The COVID-19 pandemic changed business practices worldwide. The traditional workplace transformed; for many, the “new norm” is now a home office ...
CIS Hardened Images
Published on 05.21.2020
Verizon’s Data Breach Investigations Report (DBIR) provides an annual analysis of security incidents and data breaches. The information and analy...
CIS ControlsMS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More






