Updated prescriptive guidance for establishing a secure configuration posture for Amazon, Oracle, Apple iOS, Oracle, as well as new CIS Build Kits.

Guidance from the DoD has indicated CIS Benchmarks can be utilized in place of STIGs-configuration standards for DoD IA and IA-enabled devices/systems.

CIS Guide explains how best to secure Remote Desktop Protocol (RDP) to protect and defend against the most pervasive cyber threats that are faced today.

Implementing foundational cloud security systems to harden environments protect against cyber-attacks and misconfiguration.

The Center for Internet Security (CIS) is celebrating 20 years making the connected world a safer place for people, businesses, and governments worldwide.

As the focal point for cyber thereat prevention, protection, response, and recovery for U.S. SLTTs, the MS-ISAC reached 10,000 members in November 2020.

CIS is released CIS-CAT Pro Assessor v4.1.0 with a graphical user interface (GUI) to support the execution of cybersecurity policies.

New features to measure CIS Controls implementation with CIS CSAT Pro including a task calendar, tags, and discussions; PCI DSS mappings, and more.

New CIS Hardened Image for Microsoft Windows Server 2016 STIG available Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Oracle Cloud Marketplaces.

Check out the latest CIS Benchmarks for November 2020, including Zoom Benchmark, Apache HTTP 2.4, Apple macOS, Microsoft Azure and more.

The Multi-State Information Sharing and Analysis Center has created a list of End-of-Support (EOS) software dates from 1/01/2019 to 4/2020.

CIS provides resources to help organizations meet their responsibilities of the shared responsibility model for cloud security on AWS.

Learn about the latest CIS Benchmark assessment scoring changes the Security Best Practices team has made for CIS-CAT Pro.

Common attacks that occur through videoconferencing systems such as Zoom, WebEx, Microsoft Teams, and BlueJeans and how to configure these systems securely.

In September 2020, there was a return of three malware and the Top 10 Malware variants composed 87% of Total Malware activity.

1 2 3 22