Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
80 Results Found
71 - 80 of 80 results
Published on 07.24.2018
CIS Hardened Images in Azure GovernmentThe use of virtual images is increasing as more government workloads shift from on-premises to cloud-based environments. Virtual images are a cos...
Published on 07.03.2018
Staying Secure with CIS Hardened Image for Red Hat Enterprise Linux 7From data leaks to information theft, security concerns are at an all-time high for organizations around the world. CIS offers multiple ways to h...
Published on 06.05.2018
How Security Controls Can Improve Your Cybersecurity PostureBy Sean Atkinson, Chief Information Security Officer, CIS® Security is a journey, not a destination. It is important to understand that as securi...
Published on 05.17.2018
Your GDPR Questions AnsweredThe General Data Protection Regulation (GDPR) aims primarily to give control back to EU citizens and residents over their personal data while sta...
Published on 03.07.2018
Secure Cloud Environments for U.S. Government Agencies in AWS GovCloudCIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...
Published on 09.26.2017
Delivering Security in the Cloud with CIS Hardened ImagesCIS Hardened Images are virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secur...
Published on 08.01.2017
Python Script for Staying Secure with the Latest CIS AMIsYou already know that CIS Hardened Images help you save time and money on hardware purchasing, software licensing, and maintenance. CIS has now m...
Published on 07.06.2017
CIS Hardened Images Now on Google Cloud PlatformAn increasingly popular computing solution, virtual images (sometimes called virtual machines) help businesses around the world save time and mon...
Published on 07.29.2016
Data DeserializationComputer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency. When da...
Published on 07.05.2016
Infographic: Was Your Last Data Breach An Inside Job?Data breaches can happen to any organization. Whether carried out maliciously or simply the result of employee error, read below to learn just ho...
Explore Related Cybersecurity Solutions
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn MoreProtect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn MoreCIS CyberMarket
Learn MoreCIS Hardened Images
Learn MoreCIS SecureSuite
Learn MoreCIS Services
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn MoreAccess resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More