Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
78 Results Found
21 - 30 of 78 results
Published on 10.06.2021
3 Ways to Use CIS Cloud Security Resources on the AWS CloudIt’s obvious that the remote capabilities of the modern day office have transformed permanently. Most organizations will see an increase in hybri...
Published on 09.23.2021
How CIS & ATO on AWS Can Ease the Compliance ProcessCybercriminals target public sector organizations every day. From ransomware attacks to data theft, systems need defense-in-depth best practices ...
Published on 09.09.2021
Join CIS at AWS Public Sector Summit 2021 in DCThe Center for Internet Security (CIS) is excited to sponsor and attend the Amazon Web Services (AWS) Public Sector Summit at booth 209. This yea...
Published on 09.07.2021
Four Reasons to Use Hardened VMs for Your Cloud MigrationEnsuring your organization’s IT environment is not only secure, but also patched regularly, can be challenging. Migrating to the cloud can help a...
Published on 08.18.2021
How to Layer Secure Docker Containers with Hardened ImagesAs organizations utilizing the cloud mature, they find more innovative and effective solutions for their workloads. Containerized applications of...
Published on 08.12.2021
How to Meet STIG Compliance and Achieve OS Security with CISOrganizations tasked with meeting regulatory framework compliance know the difficulties they will face. On top of the resource hours, it can be c...
Published on 07.08.2021
New Hardened VMs from CIS: Graviton2 & Windows 2019 STIGThe Center for Internet Security (CIS) has released three new CIS Hardened Images. CIS built two of these new hardened virtual machines (VMs) on ...
Published on 06.21.2021
5 Tips to Harden Your OS On-Prem or in the CloudCloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). Th...
Published on 06.17.2021
What You Need to Know About Hybrid Cloud EnvironmentsWhat does your cloud configuration look like? In many organizations, moving workloads to the cloud creates a more elastic technology infrastructu...
Published on 05.11.2021
5 Cloud Computing Benefits: Why You Should Work in the CloudWhat are the benefits of cloud computing? Many organizations find that cloud service providers (CSPs) can meet their needs while providing a numb...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More