Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
78 Results Found
41 - 50 of 78 results
Published on 12.01.2020
CIS Cloud Security Resources for STIG ComplianceSecuring your IT infrastructure can be a challenge, especially if you’re working in a regulated environment. To help organizations with this chal...
Published on 11.24.2020
Foundational Cloud Security with CIS BenchmarksCloud service providers (CSPs) have changed the way organizations of all sizes architect and deploy their IT environments. CSPs now make it possi...
Published on 11.23.2020
CIS: Celebrating 20 Years of CybersecurityThis year, the Center for Internet Security (CIS) is celebrating 20 years of making the connected world a safer place for people, businesses, and...
Published on 11.17.2020
New CIS Hardened Images for Windows STIG, SUSE, and UbuntuCIS continues to bring security to the cloud with virtual machine images pre-configured to the recommendations of the CIS Benchmarks. There are m...
Published on 11.05.2020
Advancing Cloud Security with CIS on AWSIncreased demand for remote work capabilities continues throughout 2020. Customer security in the cloud remains an important part of that growth....
Published on 09.02.2020
New CIS Foundations Benchmark for Oracle CloudOracle Cloud users have a new resource to help secure their cloud environments: the CIS Oracle Cloud Infrastructure Foundations Benchmark. This o...
Published on 08.13.2020
How to Provide a Secure Cloud Environment for Remote WorkersThe shift to a global remote workforce is demonstrating just how difficult securing a cloud environment can be. This is especially true for organ...
Published on 06.09.2020
Shared Responsibility for Cloud Security: What You Need to KnowThe COVID-19 pandemic changed business practices worldwide. The traditional workplace transformed; for many, the “new norm” is now a home office ...
Published on 03.30.2020
CIS Hardened Images Built on Google Cloud’s Shielded VMsGoogle Cloud announced general availability of its Shielded VMs (virtual machines) at a breakout session during Google Cloud Next ‘19. As a resul...
Published on 01.09.2020
8 Cyber Thought Leaders Share Security Trends for the New YearCybersecurity trends shift each year as different attacks take hold and technologies adapt to meet the demands of an evolving, connected world. A...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More