Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
595 Results Found
Solutions
Industry
61 - 70 of 595 results
Published on 02.08.2024
Cyber threat actors are targeting SLTTs with malware that use fake browser updates and secondary exploitation. The MS-ISAC breaks down this threa...
MS-ISAC
Published on 02.07.2024
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for February 2024.
CIS Benchmarks
Published on 01.25.2024
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.
Published on 01.19.2024
2023 was a year full of efforts to help support you in meeting your secure cloud goals. Here's a look back at just a few of them.
Published on 01.18.2024
Thinking of migrating to the cloud? Here are some key benefits, challenges, and methods for planning out a process that will work for your organi...
Published on 01.11.2024
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2024.
CIS Benchmarks
Published on 01.08.2024
Cyber threat actors show no sign of curbing their Adversary in the Middle (AiTM) phishing attacks against SLTTs. Here's how to defend your organi...
MS-ISAC
Published on 01.04.2024
Looking for context you can use to map out your 2024 cybersecurity priorities? 16 CIS experts share their cybersecurity predictions for the year ...
Published on 12.11.2023
The traditional testing approach for non-voting technology constrains election security. Learn how RABET-V does things differently.
Published on 12.05.2023
The Top 10 Malware in Q3 2023 saw some significant shifts from the previous quarter. Here's what the CTI team at the MS-ISAC® observed.
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More