Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

Chain of custody also applies to digital materials such as electronic transmissions or records.

AlmaLinux OS
October 22, 2021

Securing AlmaLinux OS An objective, consensus-driven security guideline for the AlmaLinux OS Operating Systems

CIS's own Tony Sager is a guest on the Defense in Depth podcast talking about recruiting and whether there is a lack of industry applicants, or employers don’t know how to find them.

Learn more about how adding CIS Hardened Images to NGINX environments allows you to enjoy security without sacrificing computational efficiency.

The MS-ISAC observed Shlayer and CoinMiner leading the top 10 (which comprise of 74% of total activity) with Zloader making its first appearance.

Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.

Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.

Some policy veterans are raising concern that partnership and collaboration may be taking a backseat to ransomware regulation.

CIS president and CEO John Gilligan and CTO Kathleen Moriarty discuss the group’s current efforts and vision for the future.

Multi-factor authentication (MFA) solutions are often considered to provide a higher level of protection against attacks. There are numerous solutions to choose from.

CIS Chief Product Architect discusses how the Open Security Alliance helps enable the cooperative ecosystem.

Join the CIS and the MS-ISAC at the Virtual 11th Annual Cyber Security Summit on October 25-27.

Philippe Langlois co-author of the Verizon DBIR joins the podcast in celebration of Cybersecurity Awareness Month to discuss why the DBIR and CIS Community Defense Model (CDM) provide a more holistic picture of cybersecurity.

CIS is launching CIS Endpoint Security Services (ESS), our new, fully-managed endpoint protection solution for U.S. State, Local, Tribal, and Territorial (SLTT) government entities.

Being able to identify the dangers not only keeps your own information safe, it also prevents it from spreading to others in your network.

1 2 3 101