Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

181 - 190 of 553 results
Securing AWS Management Configurations By Combating 6 Common Threats
Published on 04.28.2021
Combining security practices honed for your on-premises environment with recommendations from CIS’s AWS Foundations Benchmark Policy can drastica...

Will the Public and Private Cybersecurity Sector Join Forces Against Ransomware?
Published on 04.28.2021
Both private-sector vendors and public agencies have a responsibility to rally around a security baseline with their ransomware efforts.

Water utility CISO offers tips to stay secure as IT and OT converge
Published on 04.26.2021
From an economics point of view, solutions that can be simultaneously implemented across both IT and OT environments is a good place for a utilit...

Mapping Your Way To Compliance With Cybersecurity Frameworks
Published on 04.26.2021
Organizations today need to comply with multiple policy, regulatory, and legal security frameworks, which can be difficult and time consuming.

7 steps to stop phishing attacks from stealing your personal details
Published on 04.23.2021
While it's difficult to be completely protected from phishing, there are some rules to follow that can help keep you from handing over personal d...

Cyber resilience: your last line of defence
Published on 04.21.2021
By definition, cyber resilience measures an organisation’s strength in preparing for, operating through and recovering from an attack.

2021 Developments in State Cybersecurity Safe Harbor Laws
Published on 04.21.2021
The Utah safe harbor is not expressly limited to tort claims, potentially broadening its scope to include an affirmative defense against contract...

Just What The Cyber Doctors Ordered – OT For Pharmaceutical Companies
Published on 04.20.2021
Cybersecurity for Pharmaceutical Companies offers advice about how to protect the pharmaceutical industry from an Operational Technology (OT) per...

Nonprofit provides help to hospitals battling ransomware
Published on 04.19.2021
The Center for Internet Security recently launched a free tool for private U.S. hospitals to block malicious activity such as ransomware.

Where does zero trust begin and why is it important?
Published on 04.16.2021
Zero trust architectures reinforce the point that no layer of the stack trusts the underlying components, whether that be hardware or software.

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events