Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

595 Results Found

Solutions

Industry

61 - 70 of 595 results
CTAs Leveraging Fake Browser Updates in Malware Campaigns
Published on 02.08.2024
Cyber threat actors are targeting SLTTs with malware that use fake browser updates and secondary exploitation. The MS-ISAC breaks down this threa...
MS-ISAC

CIS Benchmarks February 2024 Update
Published on 02.07.2024
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for February 2024.
CIS Benchmarks

3 CIS Resources to Help You Drive Your Cloud Cybersecurity
Published on 01.25.2024
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.

Supporting Your Secure Cloud Goals: Our 2023 Year in Review
Published on 01.19.2024
2023 was a year full of efforts to help support you in meeting your secure cloud goals. Here's a look back at just a few of them.

Migrating to the Cloud: An Overview of Process and Strategy
Published on 01.18.2024
Thinking of migrating to the cloud? Here are some key benefits, challenges, and methods for planning out a process that will work for your organi...

CIS Benchmarks January 2024 Update
Published on 01.11.2024
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2024.
CIS Benchmarks

CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Published on 01.08.2024
Cyber threat actors show no sign of curbing their Adversary in the Middle (AiTM) phishing attacks against SLTTs. Here's how to defend your organi...
MS-ISAC

16 CIS Experts Cybersecurity Predictions for 2024
Published on 01.04.2024
Looking for context you can use to map out your 2024 cybersecurity priorities? 16 CIS experts share their cybersecurity predictions for the year ...

RABET-V: A New Approach to Testing Election Technology
Published on 12.11.2023
The traditional testing approach for non-voting technology constrains election security. Learn how RABET-V does things differently.

Top 10 Malware Q3 2023
Published on 12.05.2023
The Top 10 Malware in Q3 2023 saw some significant shifts from the previous quarter. Here's what the CTI team at the MS-ISAC® observed.
MS-ISAC

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions