Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

556 Results Found
11 - 20 of 556 results
Celebrating Victories: Catching up with the Inaugural Alan Paller Laureate Program Awardees
Published on 02.15.2024
Celebrating Victories: Catching up with the Inaugural Alan Paller Laureate Program Awardees
CIS celebrates the truly awe-inspiring recipients from the 2023 Alan Paller Laureate Program. Check out their stories today.

CTAs Leveraging Fake Browser Updates in Malware Campaigns
Published on 02.08.2024
CTAs Leveraging Fake Browser Updates in Malware Campaigns
Cyber threat actors are targeting SLTTs with malware that use fake browser updates and secondary exploitation. The MS-ISAC breaks down this threa...

CIS Benchmarks February 2024 Update
Published on 02.07.2024
CIS Benchmarks February 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for February 2024.

3 CIS Resources to Help You Drive Your Cloud Cybersecurity
Published on 01.25.2024
3 CIS Resources to Help You Drive Your Cloud Cybersecurity
Once you've migrated to the cloud, you need to prioritize your cloud cybersecurity. These three resources from CIS can help.

Supporting Your Secure Cloud Goals: Our 2023 Year in Review
Published on 01.19.2024
Supporting Your Secure Cloud Goals: Our 2023 Year in Review
2023 was a year full of efforts to help support you in meeting your secure cloud goals. Here's a look back at just a few of them.

Migrating to the Cloud: An Overview of Process and Strategy
Published on 01.18.2024
Migrating to the Cloud: An Overview of Process and Strategy
Thinking of migrating to the cloud? Here are some key benefits, challenges, and methods for planning out a process that will work for your organi...

CIS Benchmarks January 2024 Update
Published on 01.11.2024
CIS Benchmarks January 2024 Update
Here is an overview of the CIS Benchmarks that the Center for Internet Security updated or released for January 2024.

CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Published on 01.08.2024
CTAs Using Adversary in the Middle (AiTM) Phishing Attacks
Cyber threat actors show no sign of curbing their Adversary in the Middle (AiTM) phishing attacks against SLTTs. Here's how to defend your organi...

16 CIS Experts Cybersecurity Predictions for 2024
Published on 01.04.2024
16 CIS Experts Cybersecurity Predictions for 2024
Looking for context you can use to map out your 2024 cybersecurity priorities? 16 CIS experts share their cybersecurity predictions for the year ...

Why Employee Cybersecurity Awareness Training Is Important
Published on 12.13.2023
Why Employee Cybersecurity Awareness Training Is Important
Not everyone invests in employee cybersecurity awareness training. Here's four experts' thoughts on why you should – and a way to save in the pro...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions