Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

576 Results Found
441 - 450 of 576 results
Small Offices, Big Security – New Guide for Securing Telework Environments
Published on 08.28.2019
Small Offices, Big Security – New Guide for Securing Telework Environments
Telecommuting is more popular than ever, allowing people to work from home or alternative environments away from the traditional office. Accordin...

PCI & CIS: Partners in Payment Data Security
Published on 08.27.2019
PCI & CIS: Partners in Payment Data Security
CIS and PCI SSC work together on an ongoing basis to increase payment data security everywhere. Here's a look at how.

Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Published on 08.15.2019
Developing New Cloud Security Guidelines for Debian Linux 8 & 9
Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...

Build Kits Speed Implementation of Secure Configurations
Published on 08.13.2019
Build Kits Speed Implementation of Secure Configurations
Secure configurations are a key best practice for limiting your organization’s cyber vulnerabilities. Because systems don’t ship securely, it’s i...

A Day in the Life of an Information Security Senior Auditor
Published on 08.06.2019
A Day in the Life of an Information Security Senior Auditor
Being an Information Security Senior Auditor brings different challenges every day. Whether she’s helping conduct assessments or evaluating risk ...

Ransomware Impacts and Defense Controls
Published on 07.31.2019
Ransomware Impacts and Defense Controls
When data is the lifeblood of your organization, ransomware hits like a heart attack. Are you prepared? Ransomware is a type of malware that bloc...

Cyber Hygiene Guidance for Windows 10
Published on 07.10.2019
Cyber Hygiene Guidance for Windows 10
According to both Net Applications and Stat Counter, all versions of the Microsoft Windows operating systems combined represent well over 50% of ...

New Features in CIS-CAT Pro v1.1.7 Dashboard
Published on 07.09.2019
New Features in CIS-CAT Pro v1.1.7 Dashboard
CIS SecureSuite® Members are receiving an update to CIS-CAT Pro Dashboard in v1.1.7. CIS-CAT Pro Dashboard is the companion tool to CIS-CAT Pro A...

Now Enlisting IT Experts: CIS Benchmarks Community Roles
Published on 07.03.2019
Now Enlisting IT Experts: CIS Benchmarks Community Roles
Have you ever wanted to be part of a global security community? Want to help develop cybersecurity recommendations for new and emerging technolog...

CIS Team Highlights from AWS re:Inforce
Published on 07.02.2019
CIS Team Highlights from AWS re:Inforce
The CIS® team had a great experience at AWS re:Inforce from June 25-26, 2019 in Boston, MA. As AWS’ inaugural security conference, re:Inforce bro...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions