Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

596 Results Found

Solutions

Industry

81 - 90 of 596 results
Timely Patching Reduces System Compromises
Published on 10.18.2023
Timely patching is one of the most important cybersecurity controls preventing system compromise – especially amid growing cyber threats.
MS-ISAC

The CIS Controls: A Way to Meet the NYS OAG Data Safety Tips
Published on 10.17.2023
In this post, we explain how you can meet some of the data safety recommendations of the NYS OAG using the CIS Controls.
CIS Controls

What is Cyber Threat Intelligence?
Published on 10.12.2023
The MS- and EI-ISAC Cyber Threat Intelligence team helps support SLTTs' cybersecurity defenses. Here's what we mean when we say "CTI."
MS-ISAC

A Short Guide for Spotting Phishing Attempts
Published on 10.12.2023
Knowing the common signs of phishing can help you spot suspicious emails and prevent a possible compromise. Here are some examples to sharpen you...
CIS Services

The Crucial Role of Cybersecurity for U.S. Election Offices
Published on 10.10.2023
U.S. election offices can't always afford to buy what they need for effective cybersecurity. Here's how CIS can help.
MS-ISAC

CIS Benchmarks October 2023 Update
Published on 10.10.2023
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for October 2023.
CIS Benchmarks

DBIR 2023: SME Cyber Defense Begins with the CIS Controls
Published on 10.06.2023
Verizon's DBIR 2023 references the CIS Controls throughout as effective mitigation tactics for SMEs to defend against top attack patterns.
CIS Controls

2022 NCSR: SLTTs Excel in Recovery Planning and Mitigation
Published on 10.02.2023
The results of the 2022 Nationwide Cybersecurity Review (NCSR) are out! Learn where SLTTs excelled and struggled in their cybersecurity efforts.
CIS Controls

Fast-Track Your Implementation of Essential Cyber Hygiene
Published on 09.28.2023
Our implementation guide works as a ladder to help you rapidly adopt IG1 of the CIS Controls and achieve essential cyber hygiene.
CIS Controls

How to Secure Your Online Identity with Security Keys
Published on 09.28.2023
An intern with our CTO office embarked on a short project to protect her accounts with security keys. Here's what her experience was like.
CIS Controls

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions