Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

576 Results Found
461 - 470 of 576 results
A Day in the Life of a Computer Emergency Response Team (CIRT) Manager
Published on 04.23.2019
A Day in the Life of a Computer Emergency Response Team (CIRT) Manager
Helping U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis can be intense, but Val...

V7.1 Introduces Implementation Groups to the CIS Critical Security Controls™
Published on 04.04.2019
V7.1 Introduces Implementation Groups to the CIS Critical Security Controls™
The CIS Critical Security Controls are internationally-recognized cybersecurity best practices for defense against common threats.  They are a co...

6 Reasons it’s Smart to Work in the Cloud
Published on 04.02.2019
6 Reasons it’s Smart to Work in the Cloud
CIS Chief Technology Officer Brian Calkin predicted in our 2019 cybersecurity trends blog that organizations would continue to move to the cloud....

SCAP 2.0, The Time Is Now
Published on 04.01.2019
SCAP 2.0, The Time Is Now
By Curtis Dukes, Executive VP and GM – CIS Security Best Practices Admonitions to try harder and spend more on cybersecurity will not prevent mor...

A Day in the Life with a Principal Software Engineer
Published on 03.21.2019
A Day in the Life with a Principal Software Engineer
At CIS, we have a team of our experts working with a global community of cybersecurity professionals. Together, they help develop tools and resou...

3 Steps to Deploying a Hardened OS by Tailoring
Published on 03.12.2019
3 Steps to Deploying a Hardened OS by Tailoring
If you’re looking for the ideal machine image template, get ready to do a little customization. A custom configuration policy is needed whenever ...

New Release: CIS Controls™ Mobile Companion Guide
Published on 03.07.2019
New Release: CIS Controls™ Mobile Companion Guide
The CIS Controls team has released a new companion guide to help organizations break down and map the applicable CIS Controls and their implement...

Version 7.1 – A new way to look at the CIS Critical Security Controls
Published on 02.28.2019
Version 7.1 – A new way to look at the CIS Critical Security Controls
The CIS Critical Security Controls are internationally-recognized for bringing together expert insight about threats, business technology, and de...

A Day in the Life with a Sr. Account Management Specialist
Published on 02.26.2019
A Day in the Life with a Sr. Account Management Specialist
CIS® is home to the Multi-State Information Sharing and Analysis Center® (MS-ISAC®). It’s the go-to resource for cyber threat prevention, protect...

Assessing Risk and Security Posture with CIS Controls Tools
Published on 02.21.2019
Assessing Risk and Security Posture with CIS Controls Tools
By Sean Atkinson, Chief Information Security Officer, and Phil Langlois, CIS Controls Technical Product Manager The CIS Controls are used by orga...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions