Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

596 Results Found

Solutions

Industry

391 - 400 of 596 results
September 2020 Top 10 Malware
Published on 10.20.2020
In September 2020, we had 3 malware return to the Top 10: CoinMiner, CryptoWall, and Emotet. The Top 10 Malware variants composed 87% of Total Ma...
MS-ISAC

Cybersecurity Practice(s), Not Perfect(ion)
Published on 10.15.2020
A version of this content first appeared in the TripWire’s “The State of Security“ blog.   The term “best practice” often comes up in tandem with...
CIS Controls

CIS Benchmarks October 2020 Update
Published on 10.14.2020
CIS is excited to announce the release of the following CIS Benchmarks. These CIS Benchmark releases would not have been possible without the tim...
CIS BenchmarksCIS SecureSuite

CIS CSAT Pro v1.1.0: New Features and Mappings for Assessing CIS Controls Implementation
Published on 10.05.2020
The CIS Controls Self Assessment Tool (CIS CSAT) Pro allows organizations to assess their implementation of the CIS Controls, enabling them to tr...
CIS ControlsCIS SecureSuite

Cyber Hygiene Matters, and So Do Definitions
Published on 09.30.2020
In an earlier article, I wrote about the importance of cyber hygiene and offered up a specific definition of basic cyber hygiene based on CIS Con...
CIS Controls

CIS Recognizes Cybersecurity Awareness Month
Published on 09.29.2020
Do Your Part. Be Cyber Smart. In October in the United States, we recognize Cybersecurity Awareness Month, a concerted effort to raise awareness ...
CIS BenchmarksCIS SecureSuite

CIS Benchmarks Community Volunteer Spotlight: SecureSky, Inc.
Published on 09.29.2020
At the Center for Internet Security (CIS) we have the privilege of working with some of the brightest minds in cybersecurity through our voluntee...
CIS BenchmarksTechnology

Top 10 Malware August 2020
Published on 09.28.2020
In August 2020, we had 4 new malware enter the Top 10 with two of them being first-timers on the list, Agent Tesla and Blaknight. The Top 10 Malw...
MS-ISAC

Protecting Organizations From Today’s Top Cyber Threats
Published on 09.21.2020
Cyber threats are constantly evolving. As recently as 2016, Trojan malware accounted for nearly 50% of all breaches. Today, they are responsible ...
CIS BenchmarksCIS SecureSuite

Business Email Compromise: Cosmic Lynx
Published on 09.17.2020
Business Email Compromise Business Email Compromise (BEC), sometimes known as Email Account Compromise (EAC), is a common scam that leverages soc...
MS-ISAC

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions