Showing results 1 - 20 of 993 for "server configuration"
BLOG POST - https://www.cisecurity.org/insights/blog/5-tips-to-harden-your-os-on-prem-or-in-the-cloud
5 Tips to Harden Your OS On-Prem or in the Cloud
Cloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). That’s ...
PAGE - https://www.cisecurity.org/ms-isac/optionsbleed-vulnerability-for-apache-web-servers
Cyber Alert: Optionsbleed Vulnerability for Apache Web Servers
Date Issued: September 20, 2017 The Multi-State Information Sharing and Analysis Center (MS-ISAC) is aware of a use-after-free memory bug called “Opti...
BLOG POST - https://www.cisecurity.org/insights/blog/5-tips-for-securing-systems-on-prem-or-in-the-clou...
5 Tips to Harden Your OS On-Prem or in the Cloud
Cloud security is just as vital as on-premises security. Hundreds of security recommendations may exist to harden your Operating Systems (OS). That’s ...
BLOG POST - https://www.cisecurity.org/insights/blog/cumulonimbus-clouds-drift-your-cloud-configuration...
Cumulonimbus Clouds Drift…Your Cloud Configuration Shouldn’t
Drifting is all good and well for the clouds in the sky, but when it comes to cloud computing, users should look out for configuration drift. A fully ...
BLOG POST - https://www.cisecurity.org/insights/blog/new-options-from-cis-for-stig-compliance
CIS Cloud Security Resources for STIG Compliance
Securing your IT infrastructure can be a challenge, especially if you’re working in a regulated environment. To help organizations with this challenge...
BLOG POST - https://www.cisecurity.org/insights/blog/cis-benchmarks-october-2020-update
CIS Benchmarks October 2020 Update
CIS is excited to announce the release of the following CIS Benchmarks. These CIS Benchmark releases would not have been possible without the time and...
MEDIA MENTION - https://www.cisecurity.org/about-us/media/media-mention/addressing-configuration-controls-w...
Addressing Configuration Controls within Cybersecurity Frameworks
Critical Security controls provide specific safeguards for mainframe computers, servers, endpoints, attached devices, network appliances, etc....
BLOG POST - https://www.cisecurity.org/insights/blog/cis-benchmarks-october-2021-update
CIS Benchmarks October 2021 Update
The following CIS Benchmark updates have been released. We’ve highlighted the major updates below. Each Benchmark includes a full changelog that can ...
WHITE PAPER - https://www.cisecurity.org/insights/white-papers/secure-configuration-management-for-cis-co...
Secure Configuration Management for CIS Control 4
This template can assist an enterprise in developing a secure configuration management policy. […]...
BLOG POST - https://www.cisecurity.org/insights/blog/cis-benchmarks-july-2020-update
CIS Benchmarks July 2020 Update
CIS Amazon Elastic Kubernetes Service (EKS) Benchmark v1.0.0 Prescriptive guidance for running Amazon Elastic Kubernetes Service (EKS) following recom...
BLOG POST - https://www.cisecurity.org/insights/blog/avoid-configuration-drift-through-effective-monito...
Avoid Configuration Drift Through Effective Monitoring
Once your organization is secured, you’ll need to ensure that your environment doesn’t stray from its protected state. Configuration drift may be inev...
BLOG POST - https://www.cisecurity.org/insights/blog/new-cis-benchmarks-cis-hardened-images-windows-ser...
New CIS Benchmarks and CIS Hardened Images for Windows Server 2019, Red Hat 8, and More
New versions of technologies are released all the time. How can you keep up with the changes and the impact they might have on security? The Center fo...
PAGE - https://www.cisecurity.org/controls/secure-configuration-of-enterprise-assets-and-software
CIS Critical Security Control 4: Secure Configuration of Enterprise Assets and Software
Overview Establish and maintain the secure configuration of enterprise assets (end-user devices, including portable and mobile; network devices; non-c...
BLOG POST - https://www.cisecurity.org/insights/blog/how-configuration-assessments-help-improve-cyber-d...
How Configuration Assessments Help Improve Cyber Defenses
There's an old adage in business; if you're not measuring something, you can't manage it. These days, information technology (IT) and information secu...
BLOG POST - https://www.cisecurity.org/insights/blog/secure-configurations-for-remote-endpoints-with-ci...
Secure Configurations for Remote Endpoints with CIS-CAT Pro
CIS-CAT Pro v4 gives you a way to manage the secure configurations of your systems – even when they're located in remote environments.[…]...
BLOG POST - https://www.cisecurity.org/insights/blog/cis-benchmarks-november-2020-update
CIS Benchmarks November 2020 Update
This month brings several new CIS Benchmarks as well as new guidance for teleconferencing. These CIS Benchmark releases would not have been possible w...