Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
652 Results Found
Solutions
Industry
1 - 10 of 652 results
Published on 05.12.2026
Have a large-scale event coming up? Here are five mitigation measures as part of a comprehensive approach to secure your city.
Published on 05.12.2026
Learn how the CIS AI Agent Companion Guide helps secure the agent layer of AI systems, governing autonomy, tool use, memory, and multi‑agent beha...
CIS Controls
Published on 05.04.2026
More than 5,000 in the U.S. SLTT cybersecurity community have affirmed their belief that collaboration in the MS-ISAC is essential. Read more.
MS-ISAC
Published on 05.01.2026
The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below. Each Benchmark...
CIS Benchmarks
Published on 04.30.2026
Download our three Companion Guides to learn how to stay aligned to the CIS Controls in your real-world AI environments.
CIS Controls
Published on 04.28.2026
AI‑driven vulnerability discovery as embodied in Mythos represents an increase in speed and volume. But it does not invalidate what works.
MS-ISAC
Published on 04.21.2026
Download our three Companion Guides to learn how to stay aligned to the CIS Controls in your real-world AI environments.
CIS Controls
Published on 04.16.2026
After RSAC 2026 Conference, Tony Sager shares his reflections on the patterns and questions that stayed with him after the rush faded.
Published on 04.14.2026
CIS Benchmarks and CIS Hardened Images enable secure cloud deployment, reduce misconfigurations, and enforce consistent security baselines.
CIS Hardened Images
Published on 04.13.2026
An ongoing MacSync Stealer campaign is targeting macOS users in U.S. SLTT government organizations. Learn more by reading CIS CTI's analysis.
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More








