Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

405 Results Found
Searching ...
CIS Controls Enterprise Asset Management Policy Template blog graphic
Published on 06.29.2022
CIS Controls Enterprise Asset Management Policy Template
To implement an enterprise asset management process, enterprises can use a policy template based on the CIS Critical Security Controls.
How to Build Cybersecurity Compliance with Free CIS Resources
Published on 06.28.2022
How to Build a Cybersecurity Compliance Plan (with Free CIS Resources)
Cybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them.
2022 AWS re:Inforce
Published on 06.24.2022
Explore Cloud Security with CIS at AWS re:Inforce 2022
CIS Hardened Images can assist with your cloud security. That's one of the messages we're bringing to AWS re:Inforce 2022.
Blog image Making Time for Ongoing Security Awareness Training
Published on 06.22.2022
Making Time for Ongoing Security Awareness Training
The key to emphasizing security awareness training is making the most of what's already available, including CIS's partnership with SANS.
Top 10 Malware May 2022 blog thumbnail
Published on 06.20.2022
Top 10 Malware - May 2022
The MS-ISAC shares that its top 10 malware lineup for May 2022 remained consistent with the exception of Jupyter's return.
Blog post  Fake Facebook Email Uses Copyrights to Trick EI-ISAC Members
Published on 06.17.2022
Fake Facebook Email Uses Copyrights to Trick EI-ISAC Members
Malicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-the...
Why consider a career in cybersecurity blog image
Published on 06.15.2022
Why Consider a Career in Cybersecurity?
As technology evolves and cybersecurity threats continue to grow, the need for qualified cybersecurity candidates only intensifies.
End of Support Software Report List Main Image
Published on 06.14.2022
End of Support Software Report List - May 2022
The importance of replacing software before its End-of-Support (EOS) is critical. EOS occurs when software updates, patches, and other forms of s...
Top 10 Malware for April 2022
Published on 06.07.2022
Top 10 Malware April 2022
In April 2022, with the exception for both CryptoWall and RedLine returning to the Top 10, the lineup remained consistent with the previous month...
Going to Collision 2022?  CIS will see you there!
Published on 06.06.2022
Going to Collision 2022 CIS Will See You There
CIS is excited to sponsor and attend Collision 2022 at Booth E308. The event takes place at the Enercare Centre in Toronto, Canada on June 20-23....

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions