CIS ESS Mobile offers visibility into blind spots on mobile devices

While most organizations focus cybersecurity efforts on fortifying their networks, the mobile devices connected to them often remain vulnerable. In addressing this gap, the Center for Internet Security (CIS) introduces CIS Endpoint Security Services (E… Continue reading CIS ESS Mobile offers visibility into blind spots on mobile devices

Migrating to the cloud: An overview of process and strategy

Over the next few years, the number of organizations navigating to the cloud to advance their business goals is expected to grow exponentially. According to Gartner, more than 70% of enterprises will use cloud platforms to accelerate their business ini… Continue reading Migrating to the cloud: An overview of process and strategy

Prioritizing CIS Controls for effective cybersecurity across organizations

In this Help Net Security interview, Randy Marchany, CISO at Virginia Tech, discusses the challenges and strategies associated with implementing CIS Controls in organizations of varying sizes. Marchany explores the importance of securing top-level mana… Continue reading Prioritizing CIS Controls for effective cybersecurity across organizations

Crunchy Data and Center for Internet Security help businesses secure Postgres deployments

Crunchy Data in collaboration with the Center for Internet Security, announced the publication of the PostgreSQL CIS Benchmark for PostgreSQL 16. Crunchy Data worked with the Defense Information Systems Agency (DISA) to make PostgreSQL the first open s… Continue reading Crunchy Data and Center for Internet Security help businesses secure Postgres deployments

Uphold Linux systems’ performance and availability in Azure

Cloud computing carries many benefits for your business… as long as you can ensure the performance and availability of your cloud environments. Let’s take the following three cloud computing benefits as examples. Rapidly scale cloud services: In … Continue reading Uphold Linux systems’ performance and availability in Azure

Cloud security and functionality: Don’t settle for just one

Cloud security is important to you, but that doesn’t mean you’re willing to trade security for functionality. You need security to work for you. Whatever cloud security resources you’re using must be compatible with the services you use to power your e… Continue reading Cloud security and functionality: Don’t settle for just one

CIS SecureSuite membership: Leverage best practices to improve cybersecurity

Whether you’re facing a security audit or interested in configuring systems securely, CIS SecureSuite Membership is here to help. CIS SecureSuite provides thousands of organizations with access to an effective and comprehensive set of cybersecuri… Continue reading CIS SecureSuite membership: Leverage best practices to improve cybersecurity

CIS Benchmarks Communities: Where configurations meet consensus

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the case with the CIS Benchmarks. They’re the only consensus-developed security conf… Continue reading CIS Benchmarks Communities: Where configurations meet consensus