Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

211 - 220 of 549 results
Report Highlights Cyber Risks to U.S. Election Systems
Published on 02.11.2021
Election systems are vulnerable to the same cyber risks exposed by the SolarWinds hack, the report said.

Can Your Organization Obtain Reasonable Cybersecurity? Yes, and Here’s How
Published on 02.09.2021
Cybersecurity expectations are vague, and that has to change if there is any chance of approaching a reasonable amount of cybersecurity.

Is Your Vaccine Card Selfie a Gift for Scammers? Maybe
Published on 02.06.2021
You finally got your vaccine, and you’re excited to share the proof. Here’s why that may not be a good idea, and what you can do instead.

Defining Success and Mapping the Road Ahead for Public-Private Partnership and Critical Infrastructure Cybersecurity
Published on 02.04.2021
With talk of cyber Pearl Harbors or digital 9/11s, critical infrastructure cybersecurity might border on alarmism, but there is real reason for c...

Getting Started With Cloud Data Protection
Published on 02.03.2021
When customers ask for data protection in the cloud, they might mean data security, or data privacy, or both. Both overlap considerably.

How the CIS Foundations Benchmarks Are Key to Your Cloud Security
Published on 02.02.2021
The cloud benchmarks vary depending on the provider. But there are a few shared elements between them to enhance your cloud security.

Oracle Cloud Marketplace Now Available to U.S. Government Customers
Published on 01.27.2021
Agencies can leverage Oracle Cloud Marketplace to quickly find and deploy new applications in the cloud to improve operations and better serve co...

How Secure Configurations Meet Consensus
Published on 01.26.2021
CIS Benchmarks community members enjoy collaborating and networking with thousands of cybersecurity experts from around the globe.

Overcoming Cloud Asset Management Challenges
Published on 01.26.2021
The key to maintaining security in a modern cloud environment is to implement continuous discovery and interrogation, which requires automation.

“Tech Talk USA” with Kathleen Moriarty from the Center for Internet Security
Published on 01.25.2021
CIS's differentiator is trust in our controls and benchmarks that provide assurance that systems and applications are as expected.

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events