Blog Posts
Industry news, product updates, videos, infographics, and more from CIS
Filter by Topic
78 Results Found
1 - 10 of 78 results
Published on 06.27.2024
Navigating CentOS 7 EOL to Maintain Your Cloud SecurityEOL for an operating system can necessitate a shift in your security efforts, as is the case with the CentOS 7 EOL. Here's how to navigate the pr...
Published on 11.16.2023
CIS Hardened Images Now in Microsoft Azure MarketplaceMicrosoft Azure is a major cloud provider of virtual machine images – and one of four where the Center for Internet Security offers CIS Hardened ...
Published on 11.07.2023
How CIS Can Help You Enact Defense-in-Depth in the CloudIn a previous post, we introduced the concept of defense-in-depth and explained how it strengthens an enterprise’s security program against a
Published on 10.24.2023
Hardened Windows Desktop OSes Debut on Azure Marketplace!CIS has released Hardened Images for Microsoft Windows 10 and 11 on the Azure Marketplace. Here's what this means for your cloud security needs.
Published on 09.13.2023
Defense-in-Depth: A Necessary Approach to Cloud SecurityDefense-in-depth is a necessary methodology for securing the cloud. Here's how the Center for Internet Security can help your organization.
Published on 08.30.2023
Cloud Security and Functionality: Don’t Settle for Just OneCIS is testing its CIS Hardened Images with Azure Update Manager and Amazon EC2 Image Builder. Here's what this means for your cloud security.
Published on 01.31.2023
Visualize Change with an Out-of-the-Box Configuration ReportCIS is releasing an out-of-the-box configuration report to help give you visibility in the software updates we’ve implemented from one month to t...
Published on 01.30.2023
Expanding the Availability of CIS Hardened Images on OracleThe Center for Internet Security (CIS) has worked with Oracle Cloud Marketplace to expand international availability of our CIS Hardened Images.
Published on 01.17.2023
Security in the Cloud with More AutomationCIS is making security in the cloud even easier for you by releasing a CIS hardening component in EC2 Image Builder on Amazon Web Services (AWS).
Published on 07.20.2022
How CIS Hardened Images Can Help with Cloud SecurityHardening an OS in the cloud can be a tedious process without hardened virtual images. Learn how CIS's Hardened Images can help with cloud securi...
Explore Related Cybersecurity Solutions
![CIS Benchmarks](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/uploads/2022/11/cis-benchmarks-2x.png?h=92&iar=0&w=506&rev=d6647217d71d4c48a48d56a45310ab1d&hash=0188A344D72FBBCACB47442769D2A4F0)
Safeguard IT systems against cyber threats with more than 100 configuration guidelines across more than 25 vendor product families.
Learn More![CIS Controls](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-controls-2x.png?h=92&iar=0&w=506&rev=ca698aae52114f09addebb2abe7ece68&hash=9A1D0EB75EC8086F47DBA4F26F17CD81)
Protect your organization from cyber-attacks with globally recognized CIS Controls, companion guides, and mappings.
Learn More![CIS CyberMarket](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-cybermarket-2x.png?h=92&iar=0&w=506&rev=ea7a40c6f3e54c499bbd4f944534be4e&hash=4761DB162EF55588ACADEAC005D87800)
CIS CyberMarket
Learn More![CIS Hardened Images](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-hardened-image-2x.png?h=92&iar=0&w=506&rev=8dcca1f1565944e68c9419e97226e635&hash=78C8AC09F2ECAEFF06AFBB8A7A678C5B)
CIS Hardened Images
Learn More![CIS SecureSuite](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-securesuite-2x.png?h=92&iar=0&w=506&rev=557d7a3960a74b40a1b48f89d355a48c&hash=480170679111A9C965586D085C24FA7B)
CIS SecureSuite
Learn More![CIS Services](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-services-2x.png?h=92&iar=0&w=506&rev=77ef3596fa0d4b0896dc8d9ed417cf2e&hash=4E8C8506E1656DAA9F002AD9F169A536)
CIS Services
Learn More![EI-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ei-isac-2x.png?h=92&iar=0&w=506&rev=8abad6f86568423fb38760487a34344d&hash=5BE5437319134F62E3271E5C09EF446F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More![MS-ISAC](https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/img/logos-and-icons/2022/cis-ms-isac-2x.png?h=92&iar=0&w=506&rev=cd31677319d8426abd68004db480917b&hash=8D769323AB0B0D5156805F29FCC5C25F)
Access resources for threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.
Learn More