Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
582 Results Found
1 - 10 of 582 results
Published on 10.04.2024
11 Cyber Defense Tips to Stay Secure at Work and HomeTo uphold your personal responsibility for cybersecurity, here are 11 steps that you can use to strengthen your cyber defense at home and at work...
Published on 09.25.2024
CIS Benchmarks Community Volunteer Spotlight: Rick HandleyLearn about CIS Benchmarks Community Volunteer Rick Handley. Handley has been a Community Member for 10 years and has a background in Microsoft 3...
Published on 09.23.2024
CIS Controls Community Volunteer Spotlight: Shane MarkleyMembers of the CIS Controls Community volunteer their expertise and time for the greater good of cybersecurity. Shane Markley shares how he plays...
Published on 09.16.2024
CIS Hardened Images: Reconciling Cloud Security and ServicesDon't want cloud security to limit performance or availability? Learn how we've been testing CIS Hardened Images with cloud services to support y...
Published on 09.13.2024
8 Security Essentials for Managing Your Online PresenceElection officials need to manage their online presence to stay safe from cyber threat actors. Here are eight security essentials to help you get...
Published on 09.12.2024
How to Integrate CSPM into Your Clients’ IaaS StrategyWant to protect your clients against breaches in the cloud? Learn how the CIS Hardened Images can help your clients take a comprehensive approach...
Published on 09.11.2024
Building a Reasonable Cyber Defense ProgramLooking to build a reasonable cyber defense program? Here are seven policy elements you can incorporate into your program with the help of CIS Se...
Published on 09.10.2024
CIS Benchmarks September 2024 UpdateHere is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for September 2024.
Published on 08.14.2024
The Chinese Communist Party (CCP): A Quest for Data ControlWe assess apps owned by the People’s Republic of China (PRC) and the potential threat posed to users. Does the PRC leverage these apps for ...
Published on 08.09.2024
Top 10 Malware Q2 2024Both ZPHP and DarkGate made their first appearance in the Top 10 Malware list for Q2 2024. Here's what else the CIS Cyber Threat Intelligence tea...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More