Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
585 Results Found
461 - 470 of 585 results
Published on 06.20.2019
Essential Sessions at AWS re:Inforce to Strengthen Your Cloud SecurityThe CIS team is heading to Boston, Massachusetts on June 25-26, 2019 for AWS re:Inforce. This inaugural cloud security event will bring together ...
Published on 06.18.2019
CIS Benchmark v2.0.0 for Google Chrome Provides Updated Security RecommendationsThe CIS Benchmarks team is excited to announce the release of our newest browser security recommendations. CIS Google Chrome Benchmark v2.0.0 con...
Published on 06.14.2019
Future of Cloud Security: Thoughts from AWS Public Sector SummitThe CIS team wrapped up a great week at AWS Public Sector Summit in Washington, DC. In addition to spreading the word about CIS at our booth on t...
Published on 06.13.2019
I Joined the EI-ISAC® – Now What?As an election official, there is always a laundry list of tasks to be completed. You may have checked one off your list by joining the Elections...
Published on 06.11.2019
Simplifying the Path to Cloud Security Compliance with ATO on AWSCyber threats target public sector organizations every day. From ransomware attacks to data theft, systems need defense-in-depth best practices a...
Published on 06.04.2019
New Benchmark Coverage and CIS Controls™ Feature in CIS-CAT Pro®Operating systems, containers, and servers ship with insecure default settings, leaving gaps that cybercriminals can take advantage of. That’s wh...
Published on 05.14.2019
Improve Your Cloud Security with CIS and AWS at AWS Public Sector Summit 2019The CIS team will be heading to Washington, DC on June 11-12 for AWS Public Sector Summit. We’ll be speaking about CIS Benchmarks, CIS Hardened I...
Published on 05.07.2019
3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAMFor organizations who are conducting their first cyber risk assessment, it can be challenging to know where to start. CIS RAM (Center for Interne...
Published on 04.30.2019
Election Technology Procurements GuideA Set of Best Practices for Securing Election Technology through Procurement Computer hardware, software, and other services are essential for el...
Published on 04.23.2019
A Day in the Life of a Computer Emergency Response Team (CIRT) ManagerHelping U.S. State, Local, Tribal, and Territorial (SLTT) government entities respond to cyber incidents on a daily basis can be intense, but Val...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More