Center for Internet Security

Enhancing national security: The four pillars of the National Framework for Action

Enhancing national security: The four pillars of the National Framework for Action 2024-10-24 at 07:33 By Mirko Zorz In this Help Net Security interview, John Cohen, Executive Director, Program for Countering Hybrid Threats at the Center for Internet Security, discusses the four pillars of the National Framework for Action, emphasizing how these measures can combat […]

React to this headline:

Loading spinner

Enhancing national security: The four pillars of the National Framework for Action Read More »

Meet the shared responsibility model with new CIS resources

Meet the shared responsibility model with new CIS resources 2024-10-07 at 06:01 By Help Net Security You can’t fulfill your end of the shared responsibility model if you don’t emphasize secure configurations. Depending on the cloud services you’re using, you’re responsible for configuring different things. Once you figure out those responsibilities, you then need to

React to this headline:

Loading spinner

Meet the shared responsibility model with new CIS resources Read More »

eBook: Keep assets secure after cloud migration

eBook: Keep assets secure after cloud migration 2024-09-11 at 06:00 By Help Net Security Organizations sometimes need to plan their cloud migrations with more emphasis on security and compliance. Many, therefore, struggle to keep their data safe after migrating to the cloud. To illustrate, IBM revealed that 82% of data breaches in 2023 involved data

React to this headline:

Loading spinner

eBook: Keep assets secure after cloud migration Read More »

Download: CIS Critical Security Controls v8.1

Download: CIS Critical Security Controls v8.1 2024-08-08 at 05:46 By Help Net Security Version 8.1 of the CIS Critical Security Controls (CIS Controls) is an iterative update to version 8.0. It offers prescriptive, prioritized, and simplified cybersecurity best practices that provide a clear path to improve your organization’s cyber defense program. CIS Controls v8.1 features

React to this headline:

Loading spinner

Download: CIS Critical Security Controls v8.1 Read More »

How can SLTTs defend against cyber threats?

How can SLTTs defend against cyber threats? 2024-06-19 at 11:02 By Help Net Security Managing cybersecurity for any organization is no easy feat. Improving cybersecurity maturity is often even more difficult, made increasingly challenging by the eye-watering costs of cybersecurity products and solutions. And when you are responsible for securing citizens’ data as a U.S.

React to this headline:

Loading spinner

How can SLTTs defend against cyber threats? Read More »

3 CIS resources to help you drive your cloud cybersecurity

3 CIS resources to help you drive your cloud cybersecurity 2024-05-09 at 06:01 By Help Net Security In the process of moving to the cloud, you need a security-first cloud migration strategy that considers both your security and compliance requirements upfront. In this article, we’ll discuss how you can use resources from the Center for

React to this headline:

Loading spinner

3 CIS resources to help you drive your cloud cybersecurity Read More »

The first steps of establishing your cloud security strategy

The first steps of establishing your cloud security strategy 2024-04-22 at 10:02 By Help Net Security In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so by discussing the cloud security impact of individual, concrete actions featured within the CIS Critical Security Controls (CIS Controls)

React to this headline:

Loading spinner

The first steps of establishing your cloud security strategy Read More »

How to create an efficient governance control program

How to create an efficient governance control program 2024-03-06 at 06:31 By Help Net Security Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control environment and help

React to this headline:

Loading spinner

How to create an efficient governance control program Read More »

Infosec products of the month: February 2024

Infosec products of the month: February 2024 2024-02-29 at 05:48 By Help Net Security Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, BackBox, Center for Internet Security, Cisco, CompliancePro Solutions, Cyberhaven, LOKKER, ManageEngine, Metomic, OPSWAT, Pindrop, ProcessUnity, Qualys, SentinelOne, Sumsub,Truffle Security, Vade Secure, and Varonis. CIS ESS

React to this headline:

Loading spinner

Infosec products of the month: February 2024 Read More »

New infosec products of the week: February 16, 2024

New infosec products of the week: February 16, 2024 2024-02-16 at 07:31 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from Appdome, Center for Internet Security, Cyberhaven, LOKKER, Sumsub, and CompliancePro Solutions. CIS ESS Mobile offers visibility into blind spots on mobile devices CIS ESS

React to this headline:

Loading spinner

New infosec products of the week: February 16, 2024 Read More »

CIS ESS Mobile offers visibility into blind spots on mobile devices

CIS ESS Mobile offers visibility into blind spots on mobile devices 2024-02-12 at 16:32 By Industry News While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In addressing this gap, the Center for Internet Security (CIS) introduces CIS Endpoint Security Services (ESS) Mobile, a tailored

React to this headline:

Loading spinner

CIS ESS Mobile offers visibility into blind spots on mobile devices Read More »

Migrating to the cloud: An overview of process and strategy

Migrating to the cloud: An overview of process and strategy 2024-02-05 at 06:01 By Help Net Security Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected to grow exponentially. According to Gartner, more than 70% of enterprises will use cloud platforms to accelerate their

React to this headline:

Loading spinner

Migrating to the cloud: An overview of process and strategy Read More »

Prioritizing CIS Controls for effective cybersecurity across organizations

Prioritizing CIS Controls for effective cybersecurity across organizations 2024-01-24 at 07:32 By Mirko Zorz In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations of varying sizes. Marchany explores the importance of securing top-level management support, breaking down data silos, and

React to this headline:

Loading spinner

Prioritizing CIS Controls for effective cybersecurity across organizations Read More »

Accelerate essential cyber hygiene for your small business

Accelerate essential cyber hygiene for your small business 2024-01-09 at 06:01 By Help Net Security Think you’re too small to experience a cyber attack? That’s not the case. In fact, cyber threat actors (CTAs) are increasingly setting their sights on small businesses. If successful, their attack attempts can be devastating. Fortunately, the Center for Internet

React to this headline:

Loading spinner

Accelerate essential cyber hygiene for your small business Read More »

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments 16/11/2023 at 14:01 By Industry News Crunchy Data in collaboration with the Center for Internet Security, announced the publication of the PostgreSQL CIS Benchmark for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems Agency (DISA) to make PostgreSQL the first open

React to this headline:

Loading spinner

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments Read More »

Uphold Linux systems’ performance and availability in Azure

Uphold Linux systems’ performance and availability in Azure 08/11/2023 at 07:01 By Help Net Security Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following three cloud computing benefits as examples. Rapidly scale cloud services: In the absence of

React to this headline:

Loading spinner

Uphold Linux systems’ performance and availability in Azure Read More »

Essential cyber hygiene: Making cyber defense cost effective

Essential cyber hygiene: Making cyber defense cost effective 17/10/2023 at 05:32 By Help Net Security Strengthening your cyber defenses can be a daunting task. Where do you start? Which tools do you use? How much will it cost? And, what do you risk losing if you do nothing? It’s not always easy to answer these

React to this headline:

Loading spinner

Essential cyber hygiene: Making cyber defense cost effective Read More »

Cloud security and functionality: Don’t settle for just one

Cloud security and functionality: Don’t settle for just one 11/10/2023 at 06:02 By Help Net Security Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security resources you’re using must be compatible with the services you use to

React to this headline:

Loading spinner

Cloud security and functionality: Don’t settle for just one Read More »

CIS SecureSuite membership: Leverage best practices to improve cybersecurity

CIS SecureSuite membership: Leverage best practices to improve cybersecurity 12/09/2023 at 05:45 By Help Net Security Whether you’re facing a security audit or interested in configuring systems securely, CIS SecureSuite Membership is here to help. CIS SecureSuite provides thousands of organizations with access to an effective and comprehensive set of cybersecurity resources and tools to

React to this headline:

Loading spinner

CIS SecureSuite membership: Leverage best practices to improve cybersecurity Read More »

CIS Benchmarks Communities: Where configurations meet consensus

CIS Benchmarks Communities: Where configurations meet consensus 06/09/2023 at 05:47 By Help Net Security Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the case with the CIS Benchmarks. They’re the only consensus-developed security configuration recommendations both created and

React to this headline:

Loading spinner

CIS Benchmarks Communities: Where configurations meet consensus Read More »

Scroll to Top