Media Mentions

CIS in the news! Read industry articles featuring or referring to CIS.

361 - 370 of 547 results
MS-ISAC Helps as Regional Municipal Ransomware Attacks Soar
Published on 08.28.2019
The MS-ISAC doesn’t talk about its members or the work it does for its members. Calkin addressed how his organization might help in hypothetical ...

Sophisticated, Coordinated Ransomware Attacks Likely to Increase
Published on 08.20.2019
The smallest organizations that need the most help often don’t have dedicated cybersecurity personnel to dedicate to recovery.

Ransomware Attack Hits More Than 20 Texas Local Governments
Published on 08.20.2019
Ransomware often spreads through emails containing malicious links or attachments. More than 1,400 ransomware attacks were reported last year.

Texas Races to Bring Systems Back Online After Ransomware Attack
Published on 08.20.2019
Hospitals, businesses, and other networks have for years been targets of ransomware attacks. Now, hackers have increasingly focused on local gove...

Schumer Calls for Funding to Harden U.S. Election Systems
Published on 08.13.2019
Senator Schumer said that he will push for cybersecurity legislation in the upcoming federal budget to provide funds for local boards of election...

Vulnerability Scanners Boost Election Security
Published on 08.12.2019
Analysts work with trusted affiliates to conduct research and gather intelligence about cyber threats targeting elections or elections-affiliated...

Are States Letting Other Priorities Trump Cybersecurity?
Published on 08.12.2019
The top concern raised by chief information security officers has been the lack of cybersecurity budget or funding, according to NASCIO reports.

Schumer Calls for $1B National Investment in Election Security
Published on 08.12.2019
The money for cybersecurity grants is part of legislation that would also require states to collect paper ballots and set minimum cybersecurity s...

Ransomware: A Growing Problem
Published on 08.07.2019
Some argue paying the hackers in bitcoins is a good option because it’s cheaper to pay the attacker, rather than spend a small fortune to rebuild...

Addressing Configuration Controls
Published on 08.07.2019
Implementation of either STIG or CIS Benchmarks can be a challenge if the process isn’t somewhat automated, due to the disparate requirements.

 Follow Us!

If you would like to inquire about having a CIS cybersecurity expert attend or speak at your event please send your request to [email protected]


Blog


Videos


Events