Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

395 Results Found
Searching ...
Defining "Reasonable" Security with a Risk Assessment Method blog graphic
Published on 05.20.2022
Defining Reasonable Security with a Risk Assessment Method
Enterprises can use CIS RAM v2.1 for IG3 to demonstrate that a risk is reasonable upon experiencing a breach.
CIS Will be back at RSA Conference in 2022 blog graphic
Published on 05.19.2022
CIS Will Be Back at RSA Conference in 2022
For many of us, it was the last in-person industry event we attended before COVID. I'm happy to say that CIS will be back at RSA Conference this ...
Getting to Know the CIS Benchmarks blog graphic
Published on 05.17.2022
Getting to Know the CIS Benchmarks
There are many ways for you to get involved in the development process of the CIS Benchmarks and to use a Benchmark's security recommendations....
How to Get up and Running with CIS WorkBench blog graphic
Published on 05.12.2022
How to Get Up and Running with CIS WorkBench
Communities are at the heart of what CIS is all about. That's what led us to create CIS WorkBench. Read on to learn how this collaborative hub wo...
Join CIS at the 2022 AWS Summit in Washington, D.C. blog graphic
Published on 05.05.2022
Join CIS at the 2022 AWS Summit in Washington, D.C.
CIS excited to sponsor and attend the 2022 AWS Summit Washington, DC at Booth 520. Join us and learn about CIS STIG resources.
CIS Benchmarks May 2022 Update blog graphic
Published on 05.03.2022
CIS Benchmarks May 2022 Update
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for May 2022.
Jumpstart Your Security Program with Essential Cyber Hygiene blog graphic
Published on 05.02.2022
Jumpstart Your Security Program with Essential Cyber Hygiene
New resource, "Establishing Essential Cyber Hygiene," can assist U.S. State, Local, Tribal, and Territorial public organizations apply CIS Safegu...
CIS blog article image for April blog titled When Misconfigurations Open the Door to Russian Attackers
Published on 04.19.2022
When Misconfigurations Open the Door to Russian Attackers
Organizations need to address security misconfigurations in their environments so that Russian state-sponsored threat actors don't get to them fi...
Blog community defense against ransomware
Published on 04.19.2022
Community Defense Against Ransomware
This virtual Cybersecurity Modernization Summit explored the ongoing challenge of cybersecurity in the state and local government and higher educ...
April End of support software list
Published on 04.15.2022
End of Support Software Report List
The importance of replacing software before its End-of-Support (EOS) is critical. EOS occurs when software updates, patches, and other forms of s...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions