How to enhance your cyber defense program with CIS SecureSuite

Join this webinar to learn how you can prioritize your security program to meet the requirements of regulatory and compliance frameworks with the CIS Critical Security Controls and CIS Benchmarks, as well as how to assess and implement secure configura… Continue reading How to enhance your cyber defense program with CIS SecureSuite

Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Six trillion dollars. That’s how much global cybercrime cost the world’s economy in 2021, according to Cybersecurity Ventures. In an effort to take a bite out of that number, the Center for Internet Security (CIS) is committed to validating… Continue reading Cyber-attack defense: CIS Benchmarks + CDM + MITRE ATT&CK

Cyber defense: Prioritized by real-world threat data

The impact of a cybersecurity breach can be painful for any enterprise, and devastating for some. Any one of the top five threats we see in today’s environment—malware, ransomware, web application hacking, insider and privilege misuse, and target… Continue reading Cyber defense: Prioritized by real-world threat data

Design, prioritize, and implement a cyber defense program with CIS CDM 2.0

The Center for Internet Security (CIS) Community Defense Model (CDM) v2.0 can be used to design, prioritize, implement, and improve an enterprise’s cybersecurity program. Enterprises naturally want to know how effective the CIS Critical Security Contro… Continue reading Design, prioritize, and implement a cyber defense program with CIS CDM 2.0

How configuration assessments help improve cyber defenses

There’s an old adage in business; if you’re not measuring something, you can’t manage it. These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration… Continue reading How configuration assessments help improve cyber defenses

3 key elements of a strong cybersecurity program

The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully… Continue reading 3 key elements of a strong cybersecurity program

Foundational cloud security with CIS Benchmarks

Cloud service providers (CSPs) have changed the way organizations of all sizes architect and deploy their IT environments. CSPs now make it possible for organizations to rapidly implement new technologies with greater levels of ease and scalability. As… Continue reading Foundational cloud security with CIS Benchmarks

CIS Benchmarks communities: Where configurations meet consensus

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. That’s not the case with the CIS Benchmarks. They’re the only consensus-developed security conf… Continue reading CIS Benchmarks communities: Where configurations meet consensus

Secure cloud products and services with new CIS Benchmarks

The cloud continues to expand with new products and services constantly introduced by cloud service providers (CSPs). The Center for Internet Security (CIS) responded with more resources to help secure these capabilities in the cloud. The Beginner’s Gu… Continue reading Secure cloud products and services with new CIS Benchmarks

The CIS Benchmarks community consensus process

The Center for Internet Security (CIS) recently celebrated 20 years of bringing confidence to the connected world with consensus-based security guidance. The first CIS Benchmark was released in 2000. Today, there are more than 100 CIS Benchmarks config… Continue reading The CIS Benchmarks community consensus process