Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter

600 Results Found

Solutions

Industry

551 - 560 of 600 results
The Risk Conversation
Published on 03.06.2018
By Sean Atkinson, Chief Information Security Officer Our normal day-to-day business activities often don’t involve a specific focus on informatio...
CIS Controls

Discovering Security Gaps with Vulnerability Management Controls
Published on 02.27.2018
By Sean Atkinson, Chief Information Security Officer Asking the question, “Where are my gaps and have I been tested?” The process of managing an ...
CIS Controls

CIS Microsoft Azure Foundations Benchmark v1.0.0 Now Available
Published on 02.20.2018
It is with great enthusiasm we announce the release of the highly anticipated CIS Microsoft Azure Foundations Benchmark v1.0.0.  The development ...
CIS BenchmarksTechnology

Where Risks Meet Controls
Published on 02.13.2018
By Sean Atkinson, Chief Information Security Officer, CIS Using the CIS Controls to define and identify risk The implementation of the CIS Contro...
CIS Controls

How to Create a Data Protection Plan
Published on 02.07.2018
By Sean Atkinson, Chief Information Security Officer, CIS With 2018 being the “Year of Data Privacy,” organizations in every sector should focus ...
CIS Controls

New York Financial Institutions: There’s a New Certification Due Soon!
Published on 02.05.2018
Time is running out for financial institutions in New York State to submit their first certification for 23 NYCRR Part 500. New regulation 23 NYC...
CIS SecureSuite

Response Planning and the Year of Data Privacy
Published on 01.24.2018
By Sean Atkinson, Chief Information Security Officer, CIS Spectre, Meltdown, and response planning As I start my third week here at CIS, we find ...

3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
Published on 01.12.2018
For organizations who are conducting their first cyber risk assessment, it can be challenging to know where to start. CIS RAM (Center for Interne...

Secure Configurations and the Power of SCAP
Published on 01.02.2018
By Tony Sager, Senior Vice President, and Chief Evangelist Have you ever heard of Security Content Automation Protocols (SCAP)? SCAP is a method ...
CIS Benchmarks

Unaccountable and thus Unattainable Network Security
Published on 12.26.2017
By: Curtis Dukes, Executive Vice President Ransomware involves a request for a sum of money calculated to be less expense and trouble than trying...
MS-ISAC

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions