Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

549 Results Found
1 - 10 of 549 results
The First Steps of Establishing Your Cloud Security Strategy
Published on 02.28.2024
The First Steps of Establishing Your Cloud Security Strategy
You've migrated to the cloud, which means it's time to focus on cloud security. Here are some first steps to begin enacting your cloud security s...

Top 10 Malware Q4 2023
Published on 02.27.2024
Top 10 Malware Q4 2023
The Top 10 Malware in Q4 2023 changed slightly from the previous quarter. Here's what the CIS Cyber Threat Intelligence team observed.

Celebrating Victories: Catching up with the Inaugural Alan Paller Laureate Program Awardees
Published on 02.15.2024
Celebrating Victories: Catching up with the Inaugural Alan Paller Laureate Program Awardees
CIS celebrates the truly awe-inspiring recipients from the 2023 Alan Paller Laureate Program. Check out their stories today.

CTAs Leveraging Fake Browser Updates in Malware Campaigns
Published on 02.08.2024
CTAs Leveraging Fake Browser Updates in Malware Campaigns
Cyber threat actors are targeting SLTTs with malware that use fake browser updates and secondary exploitation. The MS-ISAC breaks down this threa...

CIS Benchmarks February 2024 Update
Published on 02.07.2024
CIS Benchmarks February 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for February 2024.

3 CIS Resources to Help You Drive Your Cloud Cybersecurity
Published on 01.25.2024
3 CIS Resources to Help You Drive Your Cloud Cybersecurity
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.

Supporting Your Secure Cloud Goals: Our 2023 Year in Review
Published on 01.19.2024
Supporting Your Secure Cloud Goals: Our 2023 Year in Review
2023 was a year full of efforts to help support you in meeting your secure cloud goals. Here's a look back at just a few of them.

Migrating to the Cloud: An Overview of Process and Strategy
Published on 01.18.2024
Migrating to the Cloud: An Overview of Process and Strategy
Thinking of migrating to the cloud? Here are some key benefits, challenges, and methods for planning out a process that will work for your organi...

CIS Benchmarks January 2024 Update
Published on 01.11.2024
CIS Benchmarks January 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2024.

CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Published on 01.08.2024
CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Cyber threat actors show no sign of curbing their Adversary in the Middle (AiTM) phishing attacks against SLTTs. Here's how to defend your organi...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions