Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
See All
Advisories
Blog Posts
Case Studies
Spotlights
Newsletters
CIS Benchmarks
Podcasts
Press Releases
Webinars
White Papers

Filter by Topic

77 Results Found
71 - 77 of 77 results
Your GDPR Questions Answered
Published on 05.17.2018
Your GDPR Questions Answered
The General Data Protection Regulation (GDPR) aims primarily to give control back to EU citizens and residents over their personal data while sta...

Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
Published on 03.07.2018
Secure Cloud Environments for U.S. Government Agencies in AWS GovCloud
CIS Hardened Images are securely configured virtual machines which are now available to spin up in the AWS GovCloud (US) region. AWS customers ca...

Delivering Security in the Cloud with CIS Hardened Images
Published on 09.26.2017
Delivering Security in the Cloud with CIS Hardened Images
CIS Hardened Images are virtual images hardened in accordance with the CIS Benchmarks, a set of vendor agnostic, internationally recognized secur...

Python Script for Staying Secure with the Latest CIS AMIs
Published on 08.01.2017
Python Script for Staying Secure with the Latest CIS AMIs
You already know that CIS Hardened Images help you save time and money on hardware purchasing, software licensing, and maintenance. CIS has now m...

CIS Hardened Images Now on Google Cloud Platform
Published on 07.06.2017
CIS Hardened Images Now on Google Cloud Platform
An increasingly popular computing solution, virtual images (sometimes called virtual machines) help businesses around the world save time and mon...

Data Deserialization
Published on 07.29.2016
Data Deserialization
Computer data is generally organized in data structures such as arrays, records, graphs, classes, or other configurations for efficiency. When da...

Infographic: Was Your Last Data Breach An Inside Job?
Published on 07.05.2016
Infographic: Was Your Last Data Breach An Inside Job?
Data breaches can happen to any organization. Whether carried out maliciously or simply the result of employee error, read below to learn just ho...

Explore Related Cybersecurity Solutions

Filter by topic to learn more about related cybersecurity solutions or explore all cybersecurity solutions on the button below.

Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More
CIS CyberMarket
Learn More
CIS Hardened Images
Learn More
CIS SecureSuite
Learn More
CIS Services
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More
See All Solutions