Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

80 Results Found
21 - 30 of 80 results
Join the Center for Internet Security at AWS re:Invent 2021
Published on 11.04.2021
Join the Center for Internet Security at AWS re:Invent 2021
This year, Amazon Web Services (AWS) returns to hosting its cloud computing conference, AWS re:Invent 2021, in person. Cloud professionals from a...

NGINX + CIS Hardened Images = Security at Top Efficiency
Published on 10.21.2021
NGINX + CIS Hardened Images = Security at Top Efficiency
Just under 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in July 2021, accordi...

3 Ways to Use CIS Cloud Security Resources on the AWS Cloud
Published on 10.06.2021
3 Ways to Use CIS Cloud Security Resources on the AWS Cloud
It’s obvious that the remote capabilities of the modern day office have transformed permanently. Most organizations will see an increase in hybri...

How CIS & ATO on AWS Can Ease the Compliance Process
Published on 09.23.2021
How CIS & ATO on AWS Can Ease the Compliance Process
Cybercriminals target public sector organizations every day. From ransomware attacks to data theft, systems need defense-in-depth best practices ...

Join CIS at AWS Public Sector Summit 2021 in DC
Published on 09.09.2021
Join CIS at AWS Public Sector Summit 2021 in DC
The Center for Internet Security (CIS) is excited to sponsor and attend the Amazon Web Services (AWS) Public Sector Summit at booth 209. This yea...

Four Reasons to Use Hardened VMs for Your Cloud Migration
Published on 09.07.2021
Four Reasons to Use Hardened VMs for Your Cloud Migration
Ensuring your organization’s IT environment is not only secure, but also patched regularly, can be challenging. Migrating to the cloud can help a...

How to Layer Secure Docker Containers with Hardened Images
Published on 08.18.2021
How to Layer Secure Docker Containers with Hardened Images
As organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...

How to Meet STIG Compliance and Achieve OS Security with CIS
Published on 08.12.2021
How to Meet STIG Compliance and Achieve OS Security with CIS
Organizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...

New Hardened VMs from CIS: Graviton2 & Windows 2019 STIG
Published on 07.08.2021
New Hardened VMs from CIS: Graviton2 & Windows 2019 STIG
The Center for Internet Security (CIS) has released three new CIS Hardened Images. CIS built two of these new hardened virtual machines (VMs) on ...

5 Tips to Harden Your OS On-Prem or in the Cloud
Published on 06.21.2021
5 Tips to Harden Your OS On-Prem or in the Cloud
Cloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). Th...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions