Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
78 Results Found
51 - 60 of 78 results
Published on 01.07.2020
10 Cybersecurity Practices CISOs Should Stop in 2020By Sean Atkinson, Chief Information Security Officer CISOs are often the leaders of the cybersecurity world – keeping a close watch over their or...
Published on 12.12.2019
7 Women in Tech Share Career AdviceWomen are a growing powerhouse in the tech industry. As the field diversifies and grows more inclusive over time, CIS is honored to have several ...
Published on 10.21.2019
NGINX + CIS Hardened Images Provide Security at Maximum EfficiencyJust over 25% of the internet’s busiest websites – including Dropbox, Netflix, and WordPress.com – served or proxied NGNIX in August 2019 (Source...
Published on 10.15.2019
4 Reasons Waiting to Switch to the Cloud May Cost YouDo you make decisions to ensure your organization’s environment is not only secure, but also up-to-date with the latest vulnerability patches? Mo...
Published on 09.25.2019
Oracle OpenWorld Recap: Autonomous Computing at the ForefrontThe CIS team was proud to attend Oracle OpenWorld 2019 in San Francisco this past week where we were announced as one of only ten launch partners...
Published on 08.15.2019
Developing New Cloud Security Guidelines for Debian Linux 8 & 9Whether your organization operates on-prem or in the cloud, cybersecurity should be your top priority. Easier said than done, right? Operating sy...
Published on 07.02.2019
CIS Team Highlights from AWS re:InforceThe CIS® team had a great experience at AWS re:Inforce from June 25-26, 2019 in Boston, MA. As AWS’ inaugural security conference, re:Inforce bro...
Published on 06.20.2019
Essential Sessions at AWS re:Inforce to Strengthen Your Cloud SecurityThe CIS team is heading to Boston, Massachusetts on June 25-26, 2019 for AWS re:Inforce. This inaugural cloud security event will bring together ...
Published on 06.14.2019
Future of Cloud Security: Thoughts from AWS Public Sector SummitThe CIS team wrapped up a great week at AWS Public Sector Summit in Washington, DC. In addition to spreading the word about CIS at our booth on t...
Published on 05.14.2019
Improve Your Cloud Security with CIS and AWS at AWS Public Sector Summit 2019The CIS team will be heading to Washington, DC on June 11-12 for AWS Public Sector Summit. We’ll be speaking about CIS Benchmarks, CIS Hardened I...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More