Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
618 Results Found
Solutions
Industry
1 - 10 of 618 results
Published on 10.29.2025
The CIS CTI team saw an uptick in member-submitted phishing emails in Q3 2025. Learn the overlap these emails have with the Tycoon2FA PhaaS kit.
Published on 10.28.2025
Secure by Design offers practical, risk-based strategies for integrating security into the software development lifecycle.
MS-ISAC
Published on 10.27.2025
The CIS CTI tracked two ClickFix campaigns between January 2025 and October 2025. Learn more about them and how to defend yourself.
MS-ISAC
Published on 10.16.2025
Looking to simplify security management and accelerate audits? Read our blog post to learn how our CIS SecureSuite Platform can help!
CIS SecureSuite
Published on 10.14.2025
Learn how to accelerate your healthcare compliance with CIS Hardened Images and CIS SecureSuite for secure, audit-ready cloud environments.
CIS Hardened Images
Published on 09.24.2025
Explore how reasonable cybersecurity is evolving from a legal concept into a practical standard for protecting systems and consumer data.
Published on 09.23.2025
Discover how CIS Benchmarks and CIS Controls help energy and utility companies strengthen cybersecurity across IT and OT environments.
CIS Controls
Published on 09.23.2025
The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below.
CIS Benchmarks
Published on 09.11.2025
In Q2 2025, Qilin became the most active ransomware targeting U.S. SLTT government entities. Read the CIS CTI team's analysis to learn more.
MS-ISAC
Published on 08.27.2025
Learn about the top external network risks and recommendations to harden configurations from the CIS Cyber Threat Intelligence team.
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More




.png?h=627&iar=0&w=1200&rev=3fa444ced3bb4b169670213a98733497&hash=EAEB0F064FCBC4871A1DEAD9656C55F8)


