7 CIS Experts' 2026 Cybersecurity Predictions Blog Feed - Center for Internet Security 1 week 5 days ago What does 2026 have in store for cybersecurity? Read our experts' 2026 cybersecurity predictions to find out and get planning.
CIS Benchmarks Monthly Update October 2025 Blog Feed - Center for Internet Security 1 week 5 days ago We've highlighted the major updates for CIS Benchmarks and CIS Build Kits in the Benchmarks Monthly Update for October 2025.
MS-ISAC Member-Reported Phishing Likely from Tycoon2FA PhaaS Blog Feed - Center for Internet Security 2 weeks ago The CIS CTI team saw an uptick in member-submitted phishing emails in Q3 2025. Learn the overlap these emails have with the Tycoon2FA PhaaS kit.
How Secure by Design Helps Developers Build Secure Software Blog Feed - Center for Internet Security 2 weeks 1 day ago Secure by Design offers practical, risk-based strategies for integrating security into the software development lifecycle.
ClickFix: An Adaptive Social Engineering Technique Blog Feed - Center for Internet Security 2 weeks 2 days ago The CIS CTI tracked two ClickFix campaigns between January 2025 and October 2025. Learn more about them and how to defend yourself.
Simplify Security Management with CIS SecureSuite Platform Blog Feed - Center for Internet Security 3 weeks 6 days ago Looking to simplify security management and accelerate audits? Read our blog post to learn how our CIS SecureSuite Platform can help!
Building a Secure Cloud Foundation for Healthcare with CIS Blog Feed - Center for Internet Security 4 weeks 1 day ago Learn how to accelerate your healthcare compliance with CIS Hardened Images and CIS SecureSuite for secure, audit-ready cloud environments.
Intune and M365 Support Now Included in CIS Build Kits Blog Feed - Center for Internet Security 1 month ago Learn how to streamline security with the CIS SecureSuite Platform and new Intune/M365 Build Kits — plus audit-ready reporting tools.
Reasonable Cybersecurity: From Legal Theory to Practice Blog Feed - Center for Internet Security 1 month 2 weeks ago Explore how reasonable cybersecurity is evolving from a legal concept into a practical standard for protecting systems and consumer data.
Reasonable Cybersecurity: From Legal Theory to Practice Blog Feed - Center for Internet Security 1 month 2 weeks ago Explore how reasonable cybersecurity is evolving from a legal concept into a practical standard for protecting systems and consumer data.
CIS Helps Strengthen Cybersecurity in Energy & Utilities Blog Feed - Center for Internet Security 1 month 2 weeks ago Discover how CIS Benchmarks and CIS Controls help energy and utility companies strengthen cybersecurity across IT and OT environments.
CIS Helps Strengthen Cybersecurity in Energy & Utilities Blog Feed - Center for Internet Security 1 month 2 weeks ago Discover how CIS Benchmarks and CIS Controls help energy and utility companies strengthen cybersecurity across IT and OT environments.
CIS Benchmarks Monthly Update September 2025 Blog Feed - Center for Internet Security 1 month 2 weeks ago The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below.
CIS Benchmarks Monthly Update September 2025 Blog Feed - Center for Internet Security 1 month 2 weeks ago The following CIS Benchmarks and CIS Build Kits have been updated or recently released. We've highlighted the major updates below.
Qilin Top Ransomware Threat to SLTTs in Q2 2025 Blog Feed - Center for Internet Security 2 months ago In Q2 2025, Qilin became the most active ransomware targeting U.S. SLTT government entities. Read the CIS CTI team's analysis to learn more.
Qilin Top Ransomware Threat to SLTTs in Q2 2025 Blog Feed - Center for Internet Security 2 months ago In Q2 2025, Qilin became the most active ransomware targeting U.S. SLTT government entities. Read the CIS CTI team's analysis to learn more.
Top External Network Risks And How to Fix Them Blog Feed - Center for Internet Security 2 months 2 weeks ago Learn about the top external network risks and recommendations to harden configurations from the CIS Cyber Threat Intelligence team.
Top External Network Risks And How to Fix Them Blog Feed - Center for Internet Security 2 months 2 weeks ago Learn about the top external network risks and recommendations to harden configurations from the CIS Cyber Threat Intelligence team.
CIS Controls Ambassador Spotlight: Eric Woodard Blog Feed - Center for Internet Security 2 months 3 weeks ago The CIS Controls Ambassador program is an initiative of the CIS that focuses on enhancing the adoption of key cybersecurity best practices.
CIS Controls Ambassador Spotlight: Eric Woodard Blog Feed - Center for Internet Security 2 months 3 weeks ago The CIS Controls Ambassador program is an initiative of the CIS that focuses on enhancing the adoption of key cybersecurity best practices.