Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
575 Results Found
51 - 60 of 575 results
Published on 10.24.2023
Hardened Windows Desktop OSes Debut on Azure Marketplace!CIS has released Hardened Images for Microsoft Windows 10 and 11 on the Azure Marketplace. Here's what this means for your cloud security needs.
Published on 10.24.2023
How to Calculate Your Organization's Ransomware RiskRansomware remains both a prevalent and impactful type of attack. Here's a tool to help you calculate your organization's ransomware risk.
Published on 10.18.2023
Timely Patching Reduces System CompromisesTimely patching is one of the most important cybersecurity controls preventing system compromise – especially amid growing cyber threats.
Published on 10.17.2023
The CIS Controls: A Way to Meet the NYS OAG Data Safety TipsIn this post, we explain how you can meet some of the data safety recommendations of the NYS OAG using the CIS Controls.
Published on 10.12.2023
What is Cyber Threat Intelligence?The MS- and EI-ISAC Cyber Threat Intelligence team helps support SLTTs' cybersecurity defenses. Here's what we mean when we say "CTI."
Published on 10.12.2023
A Short Guide for Spotting Phishing AttemptsKnowing the common signs of phishing can help you spot suspicious emails and prevent a possible compromise. Here are some examples to sharpen you...
Published on 10.10.2023
The Crucial Role of Cybersecurity for U.S. Election OfficesU.S. election offices can't always afford to buy what they need for effective cybersecurity. Here's how CIS can help.
Published on 10.10.2023
CIS Benchmarks October 2023 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for October 2023.
Published on 10.06.2023
DBIR 2023: SME Cyber Defense Begins with the CIS ControlsVerizon's DBIR 2023 references the CIS Controls throughout as effective mitigation tactics for SMEs to defend against top attack patterns.
Published on 10.04.2023
11 Cyber Defense Tips to Stay Secure at Work and HomeTo uphold your personal responsibility for cybersecurity, here are 11 steps that you can use to strengthen your cyber defense at home and at work...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More