Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

585 Results Found
71 - 80 of 585 results
DBIR 2023: SME Cyber Defense Begins with the CIS Controls
Published on 10.06.2023
DBIR 2023: SME Cyber Defense Begins with the CIS Controls
Verizon's DBIR 2023 references the CIS Controls throughout as effective mitigation tactics for SMEs to defend against top attack patterns.

2022 NCSR: SLTTs Excel in Recovery Planning and Mitigation
Published on 10.02.2023
2022 NCSR: SLTTs Excel in Recovery Planning and Mitigation
The results of the 2022 Nationwide Cybersecurity Review (NCSR) are out! Learn where SLTTs excelled and struggled in their cybersecurity efforts.

Fast-Track Your Implementation of Essential Cyber Hygiene
Published on 09.28.2023
Fast-Track Your Implementation of Essential Cyber Hygiene
Our implementation guide works as a ladder to help you rapidly adopt IG1 of the CIS Controls and achieve essential cyber hygiene.

How to Secure Your Online Identity with Security Keys
Published on 09.28.2023
How to Secure Your Online Identity with Security Keys
An intern with our CTO office embarked on a short project to protect her accounts with security keys. Here's what her experience was like.

Albert Network Monitoring: Guarding State, Local Governments
Published on 09.20.2023
Albert Network Monitoring: Guarding State, Local Governments
Albert Network Monitoring is an intrusion detection system (IDS) designed to help SLTTs protect their networks against cyber threats. Here's how.

6 Mitigation Strategies to Make the Most of Audit Results
Published on 09.14.2023
6 Mitigation Strategies to Make the Most of Audit Results
Audits are valuable tools that help you to identify potential risks, inefficiencies, and gaps. Here's how to make the most of your audit results.

Defense-in-Depth: A Necessary Approach to Cloud Security
Published on 09.13.2023
Defense-in-Depth: A Necessary Approach to Cloud Security
Defense-in-depth is a necessary methodology for securing the cloud. Here's how the Center for Internet Security can help your organization.

Build a Robust Continuous Audit Program in 10 Steps
Published on 09.12.2023
Build a Robust Continuous Audit Program in 10 Steps
Want visibility of control deficiencies, potential fraud, and compliance issues? A continuous audit program can help. Here's how you can get star...

Congratulations, You're Compliant: Charting Your Path Ahead
Published on 09.08.2023
Congratulations, You're Compliant: Charting Your Path Ahead
What comes next after you've achieved compliance? We've got seven things for your consideration. A CIS SecureSuite Membership can help.

FAIR: A Framework for Revolutionizing Your Risk Analysis
Published on 09.06.2023
FAIR: A Framework for Revolutionizing Your Risk Analysis
FAIR is a leading methodology for quantifying and managing information risk. Here's how a CIS SecureSuite Membership can support your risk analys...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions