Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
585 Results Found
531 - 540 of 585 results
Published on 04.02.2018
CIS RAM v1.0 Puts the CIS Controls into ActionRisk assessments are a valuable tool for gaining insight into your organization’s security posture. They allow you to view potential security thr...
Published on 03.27.2018
The One Equation You Need to Calculate Risk-Reduction ROIAs I have discussed in the past few blog posts (here and here), evaluating internal systems and services is a key component to understanding your...
Published on 03.19.2018
CIS Critical Security Controls Version 7 – What’s Old, What’s NewToday marks the release of CIS Critical Security Controls Version 7, the newest iteration of these 20 important cybersecurity recommendations. T...
Published on 03.13.2018
CIS Controls™ Volunteer Spotlight: Rick DotenThis month we’re sharing an interview with CIS Controls volunteer Rick Doten CIS values all of the volunteers who work hard to make sure the CIS ...
Published on 03.07.2018
Secure Cloud Environments for U.S. Government Agencies in AWS GovCloudCIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...
Published on 03.06.2018
The Risk ConversationBy Sean Atkinson, Chief Information Security Officer Our normal day-to-day business activities often don’t involve a specific focus on informatio...
Published on 02.27.2018
Discovering Security Gaps with Vulnerability Management ControlsBy Sean Atkinson, Chief Information Security Officer Asking the question, “Where are my gaps and have I been tested?” The process of managing an ...
Published on 02.20.2018
CIS Microsoft Azure Foundations Benchmark v1.0.0 Now AvailableIt is with great enthusiasm we announce the release of the highly anticipated CIS Microsoft Azure Foundations Benchmark v1.0.0. The development ...
Published on 02.13.2018
Where Risks Meet ControlsBy Sean Atkinson, Chief Information Security Officer, CIS Using the CIS Controls to define and identify risk The implementation of the CIS Contro...
Published on 02.07.2018
How to Create a Data Protection PlanBy Sean Atkinson, Chief Information Security Officer, CIS With 2018 being the “Year of Data Privacy,” organizations in every sector should focus ...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More