Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
597 Results Found
Solutions
Industry
181 - 190 of 597 results
Published on 09.30.2022
In MS-ISAC's Top 10 Malware list for August 2022, LingyunNET, RecordBreaker, and TeamSpy first appeared, while SocGholish and Tinba returned.
MS-ISAC
Published on 09.26.2022
To pierce the Fog of More, organizations must implement essential cyber hygiene and track their implementation of security best practices.
CIS SecureSuite
Published on 09.22.2022
Malicious actors can use a "SATAn" attack involving the SATA interface to target air-gapped computers with data theft and extortion.
CIS Controls
Published on 09.19.2022
In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure.
CIS Benchmarks
Published on 09.14.2022
To scale their cybersecurity programs, organizations should deploy layered security solutions such as those included in a CIS SecureSuite Members...
CIS SecureSuite
Published on 09.14.2022
Currently, there are two main roles that ISACs can serve in the software supply chain assurance process. Let's examine both.
MS-ISAC
Published on 09.13.2022
The LockBit 3.0 Ransomware as a Service (RaaS) gang has incorporated capabilities of the BlackMatter group into its operations.
CIS Services
Published on 09.12.2022
CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida.
CIS SecureSuite
Published on 09.08.2022
The Russian-Ukraine war has motivated APT groups to capitalize on the conflict and take sides. Such is true of Killnet.
MS-ISAC
Published on 09.06.2022
The MS-ISAC is observing an uptick in SLTT QakBot activity aligned with open-source reporting. Let's examine one of those campaigns.
MS-ISAC
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More