x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu



The Authority to Operate (ATO) program on AWS helps organizations meet common cloud security frameworks. The CIS Benchmarks help.


Multiple vulnerabilities have been discovered in VMware vCenter Server, which could result in remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Cybersecurity compliance with multiple policy, regulatory, and legal security frameworks and standards is challenging but associated best practices can be used as a starting point in building your plan.


Boockvar, Dearing, and Andino will look to improve and expand the resources CIS provides to support the needs of the elections community.


Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for arbitrary code execution in the context of the logged on user.



The Role of Service Providers in Transforming Security, describes the current threat landscape and current trends to support built-in security.


This webinar discusses land management and the importance of an all-inclusive ecosystem where all planning, design, permitting and licensing, inspection and construction management, and related activities are handled in an integrated way.


So what can you do to make sure your remote employees are properly equipped to protect against cyberattacks?


Here are is the why, when, who, what, and where for creating a cybersecurity plan, the first step in starting secure and staying secure.


Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for remote code execution.



The Multi-State Information Sharing and Analysis Center has created an End-of-Support (EOS) list of software where updates, patches, and other forms of support are no longer offered.


Multiple vulnerabilities have been discovered in Adobe Products, the most severe of which could allow for arbitrary code execution.



1 2 3 98