Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

576 Results Found
521 - 530 of 576 results
Breaking the Divide Between Governance and Operational Cybersecurity
Published on 04.10.2018
Breaking the Divide Between Governance and Operational Cybersecurity
By Sean Atkinson, Chief Information Security Officer Governance in cybersecurity Governance is an important topic in cybersecurity, as it describ...

CIS RAM v1.0 Puts the CIS Controls into Action
Published on 04.02.2018
CIS RAM v1.0 Puts the CIS Controls into Action
Risk assessments are a valuable tool for gaining insight into your organization’s security posture. They allow you to view potential security thr...

The One Equation You Need to Calculate Risk-Reduction ROI
Published on 03.27.2018
The One Equation You Need to Calculate Risk-Reduction ROI
As I have discussed in the past few blog posts (here and here), evaluating internal systems and services is a key component to understanding your...

CIS Critical Security Controls Version 7 – What’s Old, What’s New
Published on 03.19.2018
CIS Critical Security Controls Version 7 – What’s Old, What’s New
Today marks the release of CIS  Critical Security Controls Version 7, the newest iteration of these 20 important cybersecurity recommendations. T...

CIS Controls™ Volunteer Spotlight: Rick Doten
Published on 03.13.2018
CIS Controls™ Volunteer Spotlight: Rick Doten
This month we’re sharing an interview with CIS Controls volunteer Rick Doten CIS values all of the volunteers who work hard to make sure the CIS ...

Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
Published on 03.07.2018
Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
CIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...

The Risk Conversation
Published on 03.06.2018
The Risk Conversation
By Sean Atkinson, Chief Information Security Officer Our normal day-to-day business activities often don’t involve a specific focus on informatio...

Discovering Security Gaps with Vulnerability Management Controls
Published on 02.27.2018
Discovering Security Gaps with Vulnerability Management Controls
By Sean Atkinson, Chief Information Security Officer Asking the question, “Where are my gaps and have I been tested?” The process of managing an ...

CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available
Published on 02.20.2018
CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available
It is with great enthusiasm we announce the release of the highly anticipated CIS Microsoft Azure Foundations Benchmark v1.0.0.  The development ...

Where Risks Meet Controls
Published on 02.13.2018
Where Risks Meet Controls
By Sean Atkinson, Chief Information Security Officer, CIS Using the CIS Controls to define and identify risk The implementation of the CIS Contro...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions