Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

597 Results Found

Solutions

Industry

211 - 220 of 597 results
The Conti Leaks: A Case of Cybercrime’s Commercialization
Published on 07.12.2022
Various operations provide evidence of cybercrime's commercialization. In this article, we'll use the the Conti leaks as our lens.
MS-ISAC

Breaking Down the BlackCat Ransomware Operation
Published on 07.07.2022
The MS-ISAC has recently seen several BlackCat ransomware attacks targeting SLTT-affiliated organizations. Here's how you can defend yourself goi...
CIS Controls

CIS Benchmarks July 2022 Update
Published on 07.05.2022
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for July 2022.
CIS BenchmarksTechnology

CIS Controls Enterprise Asset Management Policy Template
Published on 06.29.2022
To implement an enterprise asset management process, enterprises can use a policy template based on the CIS Critical Security Controls.
CIS Controls

How to Build Cybersecurity Compliance with Free CIS Resources
Published on 06.28.2022
Cybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them.
CIS Controls

Explore Cloud Security with CIS at AWS re:Inforce 2022
Published on 06.24.2022
CIS Hardened Images can assist with your cloud security. That's one of the messages we're bringing to AWS re:Inforce 2022.
CIS Hardened Images

Making Time for Ongoing Security Awareness Training
Published on 06.22.2022
The key to emphasizing security awareness training is making the most of what's already available, including CIS's partnership with SANS.

Top 10 Malware May 2022
Published on 06.20.2022
The MS-ISAC shares that its top 10 malware lineup for May 2022 remained consistent with the exception of Jupyter's return.
MS-ISAC

Fake Facebook Email Uses Copyrights to Trick EI-ISAC Members
Published on 06.17.2022
Malicious actors recently targeted members of the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC) with a copyright-the...
MS-ISAC

Why Consider a Career in Cybersecurity?
Published on 06.15.2022
As technology evolves and cybersecurity threats continue to grow, the need for qualified cybersecurity candidates only intensifies.
CIS Hardened Images

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions