Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter
80 Results Found
Solutions
Industry
71 - 80 of 80 results
Published on 07.24.2018
The use of virtual images is increasing as more government workloads shift from on-premises to cloud-based environments. Virtual images are a cos...
CIS Hardened ImagesCIS Benchmarks
Published on 07.03.2018
From data leaks to information theft, security concerns are at an all-time high for organizations around the world. CIS offers multiple ways to h...
CIS Hardened Images
Published on 06.05.2018
By Sean Atkinson, Chief Information Security Officer, CIS® Security is a journey, not a destination. It is important to understand that as securi...
CIS Hardened ImagesCIS BenchmarksCIS SecureSuite
Published on 05.17.2018
The General Data Protection Regulation (GDPR) aims primarily to give control back to EU citizens and residents over their personal data while sta...
CIS Hardened ImagesCIS BenchmarksCIS ControlsCIS SecureSuite
Published on 03.07.2018
CIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...
CIS Hardened ImagesCIS SecureSuite
Published on 09.26.2017
CIS Hardened Images are virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secur...
CIS Hardened ImagesCIS Benchmarks
Published on 08.01.2017
You already know that CIS Hardened Images help you save time and money on hardware purchasing, software licensing, and maintenance. CIS has now m...
CIS Hardened ImagesCIS Benchmarks
Published on 07.06.2017
An increasingly popular computing solution, virtual images (sometimes called virtual machines) help businesses around the world save time and mon...
CIS Hardened ImagesCIS Benchmarks
Published on 07.29.2016
Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency. When da...
CIS Hardened ImagesMS-ISAC
Published on 07.05.2016
Data breaches can happen to any organization. Whether carried out maliciously or simply the result of employee error, read below to learn just ho...
CIS Hardened Images
Explore Related Cybersecurity Solutions

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More