Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

598 Results Found

Solutions

Industry

261 - 270 of 598 results
CIS Benchmarks January 2022 Update
Published on 01.05.2022
The following CIS Benchmarks have been updated or released for January 2022. We've highlighted the major updates below. Each Benchmark includes a...
CIS BenchmarksCIS SecureSuite

New Hardened macOS 11 & 10.15 VMs in AWS Marketplace
Published on 01.04.2022
Apple users rejoice! CIS Hardened Images for macOS Big Sur (11) and Catalina (10.15) are now available in Amazon Web Services (AWS) Marketplace. ...
CIS BenchmarksCIS Hardened Images

NSA Guidance: Zero Trust Applied to 5G Cloud Infrastructure contd: Parts 3 and 4
Published on 01.03.2022
Part 2 of a 2-part series By: Kathleen M. Moriarty, CIS Chief Technology Officer and active participant in the Critical Infrastructure Partnershi...
CIS Hardened Images

How to Defend Against Windows Management Instrumentation Attacks
Published on 12.15.2021
The Windows Management Instrumentation (WMI) protocol – infrastructure on a Windows-based operating system – is used for management data and oper...
CIS Controls

Top 10 Malware November 2021
Published on 12.12.2021
In November 2021, the Top 10 stayed consistent with the previous month with the exception of Gh0st, Mirai, and Ursnif, which returned to the Top ...
MS-ISAC

CIS Benchmarks December 2021 Update
Published on 12.09.2021
The following CIS Benchmarks have been updated or released.  We’ve highlighted the major updates below. Each Benchmark includes a full changelog ...
CIS BenchmarksCIS SecureSuite

NSA Guidance: Zero Trust Applied to 5G Cloud Infrastructure: Parts 1 and 2
Published on 12.07.2021
Part 1 of a 2-part series By: Kathleen M. Moriarty, CIS Chief Technology Officer and active participant in the Critical Infrastructure Partnershi...

Hear from the Experts with these Cybersecurity Podcasts
Published on 12.02.2021
The selection of podcasts – on everything from gaming to movies to sports – has exploded in recent years. Whatever topic you’re interested in, ch...

Preventing the Most Common Cyber-Attacks with Cybersecurity Training
Published on 12.02.2021
Many offices are operating with a hybrid of remote and in-person workspaces as the COVID-19 pandemic continues and evolves. Wherever your team is...
CIS CyberMarket

Why OAuth is so Important: An Interview with Justin Richer
Published on 12.01.2021
This is the third article in this series by Kathleen Moriarty, CIS Chief Technology Officer. In this article, Moriarty interviews Justin Richer, ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions