Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
586 Results Found
441 - 450 of 586 results
Published on 10.15.2019
4 Reasons Waiting to Switch to the Cloud May Cost YouDo you make decisions to ensure your organization’s environment is not only secure, but also up-to-date with the latest vulnerability patches? Mo...
Published on 10.10.2019
Cybersecurity is a Team SportCybersecurity relies on specialists of every kind – CISOs, network systems administrators, cloud experts, and more – to achieve success. It takes...
Published on 10.08.2019
Smart Cities Need Smarter SecurityDo you live in a “smart city”? You may be surprised to learn that your local municipality has adopted smart technologies such as Internet of Thin...
Published on 10.01.2019
6 Cybersecurity Tips to Keep Your Workplace Safe OnlineIn the office, cybersecurity is everyone’s responsibility. By reminding your employees of these simple online safety best practices, your organiz...
Published on 09.30.2019
Beyond the Ballot Box: Securing America’s Supporting Election TechnologyThere is more to America’s election technology than most people know. Most people are familiar with voting systems and voter registration systems...
Published on 09.25.2019
Oracle OpenWorld Recap: Autonomous Computing at the ForefrontThe CIS team was proud to attend Oracle OpenWorld 2019 in San Francisco this past week where we were announced as one of only ten launch partners...
Published on 09.24.2019
A Day in the Life: Product Support Team ManagerSince its founding in 2001, CIS has grown to support a wide range of products and services. These include producing no-cost CIS Benchmark PDFs fo...
Published on 09.17.2019
4 Cyber Defense Tips for Finance Industry CISOsBy Sean Atkinson, Chief Information Security Officer When we think of a sector or industry most prone to cybercriminal activity, the financial se...
Published on 09.10.2019
How Prioritized Security Controls Break Through the Fog of MoreBy Sean Atkinson, Chief Information Security Officer & Stephanie Gass, Information Security Audit and Governance The 80s and 90s may have been th...
Published on 09.03.2019
How DMARC Advances Email SecurityWhile some identity management protocols such as multi-factor authentication have made modern advancements, others – like email authentication – ...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More