Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

291 - 300 of 587 results
CISA Funds SLTT Cybersecurity Project
Published on 09.02.2020
The Malicious Domain Blocking and Reporting service will be available at no cost to SLTT members of the CIS MS-ISAC.

DHS Partners with Industry to Offer State, Local Gov’ts Cybersecurity Aid
Published on 09.02.2020
DHS teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.

Election Infrastructure Government Coordinating Council Holds Summer Meeting Virtually
Published on 08.21.2020
As an election community, we are practiced and prepared to take these challenges head on and ensure American voters decide American elections.

States Join Automated Security Pilot with MS-ISAC, Johns Hopkins
Published on 08.21.2020
Four states and a county government are taking part in an effort to deploy security orchestration, automation and response tools.

A Business Program or a Security Program – How Do You Employ The CIS Critical Security Controls?
Published on 08.20.2020
Ongoing revisions help organizations map the Controls in meaningful ways, pointing to the recent changes made to map the Sub-Controls to MITRE AT...

Center for Internet Security’s Community Defense Model
Published on 08.19.2020
The community defense model highlights the safeguards that show up on any to-do list for cybersecurity and should be implemented by most organiza...

Cleaning Up a Definition of Basic Cyber Hygiene
Published on 08.19.2020
Almost all successful attacks take advantage of conditions that could reasonably be described by most as poor cyber hygiene.

The Election Security Drills States Need to Be Doing Right Now
Published on 08.19.2020
With November right around the corner, state and local governments need to ensure the resilience and security of their election infrastructure.

Cybersecurity Risk Management Explained
Published on 08.10.2020
Cybersecurity risk management depends upon a risk analysis that calculates cybersecurity risks as the consequence of attack times the likelihood ...

Shoring up Cybersecurity in Industrial Settings
Published on 08.10.2020
Before we can affect proactive change in cybersecurity within an organization, we must understand what we have and where the greatest risk lies.

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events