Center for Internet Security
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093250/lock-400x200.jpg)
Secure cloud products and services with new CIS Benchmarks
The cloud continues to expand with new products and services constantly introduced by cloud service providers (CSPs). The Center for Internet Security (CIS) responded with …
![quantum](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104847/quantum-400x200.jpg)
The CIS Benchmarks community consensus process
The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS …
![application](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/27101818/application-blue-400x200.jpg)
How to automate configuration review
Configuration management can be challenging. IT teams can become overwhelmed between various standards, compliance requirements, and security options. As the popularity of …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101141/tools2-400x200.jpg)
How to implement secure configurations more quickly
Secure configurations are a key best practice for limiting an organization’s cyber vulnerabilities. Since systems don’t ship securely, it’s important to review and implement …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
The 5 Ws for building a strong cybersecurity plan
Creating a cybersecurity plan is the first step in starting secure and staying secure. Consider this when planning a budget, getting support from staff, and creating company …
Elastic acquires build.security to enforce security actions for cloud native environments
Elastic announced that it has entered into a definitive agreement to acquire build.security, a policy definition and enforcement platform that leverages the open source …
IBM provides Kestrel, a threat hunting tool, to Open Cybersecurity Alliance
Open Cybersecurity Alliance (OCA) announced it has accepted IBM’s contribution of Kestrel, an open-source programming language for threat hunting that is used by Security …
Panaseer unveils cyber measurement guidance to help avoid incidents
Panaseer announces guidance on best practice cybersecurity measurements to help avoid incidents. Currently, there is limited industry guidance around the most important …
![CIS Controls v8](https://img.helpnetsecurity.com/wp-content/uploads/2021/05/19100027/cis_controls_v8-1000-400x200.jpg)
18 is the new 20: CIS Controls v8 is here!
The moment we’ve all been waiting for is finally here. The Center for Internet Security (CIS) officially launched CIS Controls v8, which was enhanced to keep up with evolving …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
Getting a grip on basic cyber hygiene
We know that good “hygiene” is conducive to good health and cleanliness. And, if you’re reading this blog it’s safe to say that you’re familiar with the term “cyber” as it …
CIS launches MDBR, a no-cost ransomware protection service for private hospitals
The Center for Internet Security is launching a no-cost ransomware protection service, Malicious Domain Blocking and Reporting (MDBR), for private hospitals in the U.S. CIS is …
![vault](https://img.helpnetsecurity.com/wp-content/uploads/2020/10/18191201/vault-bkg-400x200.jpg)
How secure configurations meet consensus
Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. But that’s not the …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD