Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

584 Results Found
541 - 550 of 584 results
Response Planning and the Year of Data Privacy
Published on 01.24.2018
Response Planning and the Year of Data Privacy
By Sean Atkinson, Chief Information Security Officer, CIS Spectre, Meltdown, and response planning As I start my third week here at CIS, we find ...

3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
Published on 01.12.2018
3 Things You’ll Learn Conducting a Cyber Risk Assessment with CIS RAM
For organizations who are conducting their first cyber risk assessment, it can be challenging to know where to start. CIS RAM (Center for Interne...

Secure Configurations and the Power of SCAP
Published on 01.02.2018
Secure Configurations and the Power of SCAP
By Tony Sager, Senior Vice President, and Chief Evangelist Have you ever heard of Security Content Automation Protocols (SCAP)? SCAP is a method ...

Unaccountable and thus Unattainable Network Security
Published on 12.26.2017
Unaccountable and thus Unattainable Network Security
By: Curtis Dukes, Executive Vice President Ransomware involves a request for a sum of money calculated to be less expense and trouble than trying...

CIS Benchmarks Volunteer Spotlight: Paul Campbell
Published on 12.19.2017
CIS Benchmarks Volunteer Spotlight: Paul Campbell
This month CIS is sharing an interview with CIS Benchmarks volunteer Paul Campbell. CIS values all of the volunteers who work hard to make sure t...

Less Independence Day, more Groundhog Day: Building a good cyber defense routine
Published on 12.12.2017
Less Independence Day, more Groundhog Day: Building a good cyber defense routine
By Tony Sager, Senior Vice President, and Chief Evangelist  Although it may seem fast-paced and glamorous, the cyber threat landscape is actually...

Keeping a Watchful Eye on Software
Published on 11.29.2017
Keeping a Watchful Eye on Software
Maintaining an accurate inventory of software is more than just eliminating potential employee distractions – it can also prevent potential legal...

CIS Controls Volunteer Spotlight: James and Kelli Tarala
Published on 11.08.2017
CIS Controls Volunteer Spotlight: James and Kelli Tarala
CIS values all of the volunteers who work hard to make sure the CIS Benchmarks and CIS Controls reflect a global knowledge base of the latest kno...

Update: CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark v1.0.0
Published on 11.06.2017
Update: CIS Microsoft Windows 10 Enterprise (Release 1703) Benchmark v1.0.0
We are excited to announce we have released an update to the CIS Microsoft Windows 10 Benchmark. The updated CIS Microsoft Windows 10 Enterprise ...

It is Time to Get Serious About Securing Our Nation’s Critical Infrastructure
Published on 10.30.2017
It is Time to Get Serious About Securing Our Nation’s Critical Infrastructure
By John M. Gilligan, Chairman and Interim Chief Executive Officer, CIS® An Escalating Threat Protecting this nation’s critical infrastructure is ...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions