CIS

Achieve Security Through Compliance in the Cloud

Digging through my cupboards recently, I came across my old collection of 3½ floppy disks. It’s been quite some time…

2 years ago

Achieve CIS Compliance in Cloud, Container and DevOps Environments

If you are embracing DevOps, cloud and containers, you may be at risk if you’re not keeping your security methodologies…

2 years ago

Software Monitoring for NERC CIP Compliance: Part 1

As organizations grappled with NERC CIP version 5, Tripwire learned along the way. In this series, I’ll cover the aspect…

2 years ago

Enforce Docker Image CIS Policy Compliance with Tripwire for DevOps

We are working hard adding features to our new Tripwire for DevOps service, initially announced at BlackHat 2018. If you…

2 years ago

How DevOps and CIS Security Controls Fit Together

At this point, the Center for Internet Security’s Security Controls are an industry standard for technical cyber security. The first…

2 years ago

Two-Thirds of Organizations Don’t Use Hardening Benchmarks to Establish a Secure Baseline, Report Reveals

The Center for Internet Security’s Critical Security Controls (“the CIS Controls”) are incredibly useful in helping organizations defend themselves against…

2 years ago

Jumpstarting Your Cyberdefense Machine with CIS Controls V7

Amidst the volatility, uncertainty and noise of the cybersecurity field, few best practice frameworks have emerged as consistently reliable and…

3 years ago

Make the Most of the New CIS Controls v7

Recently, the Center for Internet Security (CIS) released its next revision of the Top 20 Security Controls. Initially developed by…

3 years ago