Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

80 Results Found
71 - 80 of 80 results
CIS Hardened Images in Azure Government
Published on 07.24.2018
CIS Hardened Images in Azure Government
The use of virtual images is increasing as more government workloads shift from on-premises to cloud-based environments. Virtual images are a cos...

Staying Secure with CIS Hardened Image for Red Hat Enterprise Linux 7
Published on 07.03.2018
Staying Secure with CIS Hardened Image for Red Hat Enterprise Linux 7
From data leaks to information theft, security concerns are at an all-time high for organizations around the world. CIS offers multiple ways to h...

How Security Controls Can Improve Your Cybersecurity Posture
Published on 06.05.2018
How Security Controls Can Improve Your Cybersecurity Posture
By Sean Atkinson, Chief Information Security Officer, CIS® Security is a journey, not a destination. It is important to understand that as securi...

Your GDPR Questions Answered
Published on 05.17.2018
Your GDPR Questions Answered
The General Data Protection Regulation (GDPR) aims primarily to give control back to EU citizens and residents over their personal data while sta...

Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
Published on 03.07.2018
Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
CIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...

Delivering Security in the Cloud with CIS Hardened Images
Published on 09.26.2017
Delivering Security in the Cloud with CIS Hardened Images
CIS Hardened Images are virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secur...

Python Script for Staying Secure with the Latest CIS AMIs
Published on 08.01.2017
Python Script for Staying Secure with the Latest CIS AMIs
You already know that CIS Hardened Images help you save time and money on hardware purchasing, software licensing, and maintenance. CIS has now m...

CIS Hardened Images Now on Google Cloud Platform
Published on 07.06.2017
CIS Hardened Images Now on Google Cloud Platform
An increasingly popular computing solution, virtual images (sometimes called virtual machines) help businesses around the world save time and mon...

Data Deserialization
Published on 07.29.2016
Data Deserialization
Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency. When da...

Infographic: Was Your Last Data Breach An Inside Job?
Published on 07.05.2016
Infographic: Was Your Last Data Breach An Inside Job?
Data breaches can happen to any organization. Whether carried out maliciously or simply the result of employee error, read below to learn just ho...

Explore Related Cybersecurity Solutions

CIS Benchmarks
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
CIS Controls
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
CIS CyberMarket
Learn More
CIS Hardened Images
CIS Hardened Images
Learn More
CIS SecureSuite
CIS SecureSuite
Learn More
CIS Services
CIS Services
Learn More
EI-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
MS-ISAC
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions